Hi,

at the WG session in Madrid a PQuAKE protocol for KEM-based authentication was 
presented by Uri and Brandon.
We have published a draft (actually, a new version of existed Guilin's draft, 
that was heavily updated)
that defines the use of KEM-based authentication in IKEv2. The design mostly 
follows PQuAKE,
but we tried to re-use the existing IKEv2 features where possible.

Any feedback is greatly appreciated.

Regards,
Valery.

-----Original Message-----
From: [email protected] <[email protected]> 
Sent: Saturday, October 18, 2025 3:08 PM
To: Guilin WANG <[email protected]>; Guilin Wang <[email protected]>; 
Valery Smyslov <[email protected]>
Subject: New Version Notification for draft-wang-ipsecme-kem-auth-ikev2-02.txt

A new version of Internet-Draft draft-wang-ipsecme-kem-auth-ikev2-02.txt has
been successfully submitted by Guilin Wang and posted to the
IETF repository.

Name:     draft-wang-ipsecme-kem-auth-ikev2
Revision: 02
Title:    KEM-based Authentication for IKEv2 with Post-quantum Security
Date:     2025-10-18
Group:    Individual Submission
Pages:    22
URL:      
https://www.ietf.org/archive/id/draft-wang-ipsecme-kem-auth-ikev2-02.txt
Status:   https://datatracker.ietf.org/doc/draft-wang-ipsecme-kem-auth-ikev2/
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-wang-ipsecme-kem-auth-ikev2
Diff:     
https://author-tools.ietf.org/iddiff?url2=draft-wang-ipsecme-kem-auth-ikev2-02

Abstract:

   This draft specifies a new authentication mechanism, called KEM (Key
   Encapsulation Mechanism) -based authentication, for the Internet Key
   Exchange Protocol Version 2 (IKEv2).  This is motivated by the fact
   that some post-quantum KEMs (like ML-KEM) are more efficient than
   post-quantum signature algorithms (like ML-DSA).



The IETF Secretariat


_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to