Hi, at the WG session in Madrid a PQuAKE protocol for KEM-based authentication was presented by Uri and Brandon. We have published a draft (actually, a new version of existed Guilin's draft, that was heavily updated) that defines the use of KEM-based authentication in IKEv2. The design mostly follows PQuAKE, but we tried to re-use the existing IKEv2 features where possible.
Any feedback is greatly appreciated. Regards, Valery. -----Original Message----- From: [email protected] <[email protected]> Sent: Saturday, October 18, 2025 3:08 PM To: Guilin WANG <[email protected]>; Guilin Wang <[email protected]>; Valery Smyslov <[email protected]> Subject: New Version Notification for draft-wang-ipsecme-kem-auth-ikev2-02.txt A new version of Internet-Draft draft-wang-ipsecme-kem-auth-ikev2-02.txt has been successfully submitted by Guilin Wang and posted to the IETF repository. Name: draft-wang-ipsecme-kem-auth-ikev2 Revision: 02 Title: KEM-based Authentication for IKEv2 with Post-quantum Security Date: 2025-10-18 Group: Individual Submission Pages: 22 URL: https://www.ietf.org/archive/id/draft-wang-ipsecme-kem-auth-ikev2-02.txt Status: https://datatracker.ietf.org/doc/draft-wang-ipsecme-kem-auth-ikev2/ HTMLized: https://datatracker.ietf.org/doc/html/draft-wang-ipsecme-kem-auth-ikev2 Diff: https://author-tools.ietf.org/iddiff?url2=draft-wang-ipsecme-kem-auth-ikev2-02 Abstract: This draft specifies a new authentication mechanism, called KEM (Key Encapsulation Mechanism) -based authentication, for the Internet Key Exchange Protocol Version 2 (IKEv2). This is motivated by the fact that some post-quantum KEMs (like ML-KEM) are more efficient than post-quantum signature algorithms (like ML-DSA). The IETF Secretariat _______________________________________________ IPsec mailing list -- [email protected] To unsubscribe send an email to [email protected]
