As an author, I naturally support WGLC. I have addressed comments in the list 
so far and added a couple of paragraphs about downgrades. It is a 
straightforward draft that does not introduce any changes other than getting 
IANA identifiers and summarizing how ML-KEM can be used with rfc9370. 
Thx

-----Original Message-----
From: Tero Kivinen via Datatracker <[email protected]> 
Sent: Friday, August 22, 2025 12:59 PM
To: [email protected]; [email protected]; 
[email protected]
Subject: [EXTERNAL] WG Last Call: draft-ietf-ipsecme-ikev2-mlkem-02 (Ends 
2025-09-05)

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you can confirm the sender and know the 
content is safe.



Subject: WG Last Call: draft-ietf-ipsecme-ikev2-mlkem-02 (Ends 2025-09-05)

This message starts a 2-week WG Last Call for this document.

Abstract:
   NIST recently standardized ML-KEM, a new key encapsulation mechanism,
   which can be used for quantum-resistant key establishment.  This
   draft specifies how to use ML-KEM as an additional key exchange in
   IKEv2 along with traditional key exchanges.  This Post-Quantum
   Traditional Hybrid Key Encapsulation Mechanism approach allows for
   negotiating IKE and Child SA keys which are safe against
   cryptanalytically-relevant quantum computers and theoretical
   weaknesses in ML-KEM.

File can be retrieved from:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/

Please review and indicate your support or objection to proceed with the 
publication of this document by replying to this email keeping [email protected] 
in copy. Objections should be motivated and suggestions to resolve them are 
highly appreciated.

Authors, and WG participants in general, are reminded again of the Intellectual 
Property Rights (IPR) disclosure obligations described in BCP 79 [1]. 
Appropriate IPR disclosures required for full conformance with the provisions 
of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any. Sanctions 
available for application to violators of IETF IPR Policy can be found at [3].

Thank you.

[1] https://datatracker.ietf.org/doc/bcp78/
[2] https://datatracker.ietf.org/doc/bcp79/
[3] https://datatracker.ietf.org/doc/rfc6701/



_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to