I've read the draft and I support the adoption.

Regards & Thanks!
Wei PAN (潘伟)

    > -----Original Message-----
    > From: Tero Kivinen via Datatracker <[email protected]>
    > Sent: Tuesday, January 13, 2026 2:10 AM
    > To: [email protected]; [email protected];
    > [email protected]
    > Subject: [IPsec] Call for adoption:
    > draft-wang-ipsecme-hybrid-kem-ikev2-frodo-03 (Ends 2026-02-09)
    > 
    > This message starts a ipsecme WG Call for Adoption of:
    > draft-wang-ipsecme-hybrid-kem-ikev2-frodo-03
    > 
    > This Working Group Call for Adoption ends on 2026-02-09
    > 
    > Abstract:
    >    Multiple key exchanges in the Internet Key Exchange Protocol Version
    >    2 (IKEv2) [RFC9370] specifies a framework, which supports multiple
    >    key encapsulation mechanisms (KEMs) in IKEv2 by allowing up to 7
    >    layers of additional KEMs to derive the final shared secret keys for
    >    IPsec protocols.  The primary goal is to mitigate the “harvest now
    >    and decrypt later” threat posed by Cryptographically Relevant
    > Quantum
    >    Computers(CRQCs).  For this purpose, one or more post-quantum
    > KEMs
    >    are usually performed in addition to the traditional (EC)DH key
    >    exchange.  This draft specifies how the post-quantum KEM algorithm
    >    FrodoKEM is instantiated for IKEv2 as an additional key exchange
    >    mechanism.
    > 
    >    [EDNOTE: IANA KE code points for FrodoKEM may need to be assigned,
    > as
    >    the code points for ML-KEM has been considered in [W-D.K25]. ]
    > 
    > Please reply to this message and indicate whether or not you support
    > adoption of this Internet-Draft by the ipsecme WG. Comments to explain
    > your preference are greatly appreciated. Please reply to all recipients of
    > this message and include this message in your response.
    > 
    > Authors, and WG participants in general, are reminded of the Intellectual
    > Property Rights (IPR) disclosure obligations described in BCP 79 [2].
    > Appropriate IPR disclosures required for full conformance with the
    > provisions of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of
    > any.
    > Sanctions available for application to violators of IETF IPR Policy can be
    > found at [3].
    > 
    > Thank you.
    > [1] https://datatracker.ietf.org/doc/bcp78/
    > [2] https://datatracker.ietf.org/doc/bcp79/
    > [3] https://datatracker.ietf.org/doc/rfc6701/
    > 
    > The IETF datatracker status page for this Internet-Draft is:
    > https://datatracker.ietf.org/doc/draft-wang-ipsecme-hybrid-kem-ikev2-frod
    > o/
    > 
    > There is also an HTML version available at:
    > https://www.ietf.org/archive/id/draft-wang-ipsecme-hybrid-kem-ikev2-frod
    > o-03.html
    > 
    > A diff from the previous version is available at:
    > https://author-tools.ietf.org/iddiff?url2=draft-wang-ipsecme-hybrid-kem-ik
    > ev2-frodo-03
    > 
    > _______________________________________________
    > IPsec mailing list -- [email protected]
    > To unsubscribe send an email to [email protected]
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to