<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hu-ipsecme-pqt-hybrid-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IKEv2 PQTH Auth">Post-Quantum Traditional (PQ/T) Hybrid Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>

    <author fullname="Hu, Jun">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jun.hu@nokia.com</email>
      </address>
    </author>
    <author fullname="Yasufumi Morioka">
      <organization>NTT DOCOMO, INC.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>yasufumi.morioka.dt@nttdocomo.com</email>
      </address>
    </author>

    <date year="2024" month="August" day="27"/>

    <area>sec</area>
    <workgroup>ipsecme</workgroup>
    <keyword>Post-Quantum</keyword> <keyword>Hybrid Authentication</keyword> <keyword>IKEv2</keyword>

    <abstract>


<?line 106?>

<t>One IPsec area that would be impacted by Cryptographically Relevant Quantum Computer (CRQC) is IKEv2 authentication based on classic asymmetric cryptograph algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. There are new Post-Quantum Cryptograph (PQC) algorithms for digital signature like NIST <xref target="ML-DSA"/>, however it takes time for new cryptograph algorithms to mature, so there is security risk to use only the new algorithm before it is field proven. This document describes a IKEv2 hybrid authentication scheme that could contain both classic and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>


  </front>

  <middle>


<?line 111?>

<section anchor="introduction"><name>Introduction</name>

<t>A Cryptographically Relevant Quantum Computer (CRQC) could break classic asymmetric cryptograph algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. New Post-Quantum Cryptograph (PQC) algorithms for digital signature are being standardized at the time of writing like NIST <xref target="ML-DSA"/>, however consider potential flaws in the new algorithm's specifications and implementations, it will take time for these new PQC algorithms to be field proven. So it is risky to only use PQC algorithms before they are mature. There is more detailed discussion on motivation of a hybrid approach for authentication in <xref section="1.3" sectionFormat="of" target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>

<t>This document describes a IKEv2 hybrid authentication scheme that contains both classic and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real world cryptographic systems.</t>

<t>Post-Quantum Cryptograph (PQC) algorithms: Asymmetric cryptograph algorithms are thought to be secure against CRQC.</t>

<t>Traditional Cryptograph algorithms: Existing asymmetric cryptograph algorithms could be broken by CRQC, like RSA, ECDSA ..etc.</t>

</section>
<section anchor="ikev2-key-exchange"><name>IKEv2 Key Exchange</name>
<t>There is no changes introduced in this document to the IKEv2 key exchange process, although it <bcp14>MUST</bcp14> be also resilient to CRQC when using along with the PQ/T hybrid authentication, for example key exchange using the PPK as defined in <xref target="RFC8784"/>, or hybrid key exchanges that include PQC algorithm via multiple key exchange process as defined in <xref target="RFC9370"/>.</t>

</section>
<section anchor="exchanges"><name>Exchanges</name>

<t>The hybrid authentication exchanges is illustrated in an example depicted in <xref target="hybrid-auth-figure"/>, the key exchange uses PPK, however it could be other key exchanges that involves PQC algorithm since how key exchange is done is transparent to authentication.</t>

<figure title="Hybrid Authentication Exchanges with RFC8784 Key Exchange" anchor="hybrid-auth-figure"><artwork><![CDATA[
   Initiator                         Responder
   -------------------------------------------------------------------
   HDR, SAi1, KEi, Ni,
        N(SIGNATURE_HASH_ALGORITHMS), N(USE_PPK) -->
                                <--  HDR, SAr1, KEr, Nr, [CERTREQ,] N(USE_PPK),
                                         N(SIGNATURE_HASH_ALGORITHMS),
                                         N(SUPPORTED_AUTH_METHODS)

   HDR, SK {IDi, CERT+, [CERTREQ,]
            [IDr,] AUTH, SAi2,
            TSi, TSr, N(PPK_IDENTITY, PPK_ID),
            N(SUPPORTED_AUTH_METHODS)} -->
                                <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                         AUTH, [N(PPK_IDENTITY)]}
]]></artwork></figure>

<section anchor="announcement"><name>Announcement</name>

<t>Both peers includes SIGNATURE_HASH_ALGORITHMS as defined in <xref section="4" sectionFormat="of" target="RFC7427"/> notification in IKE_SA_INIT exchange to indicate supported hash algorithms used with digital signature.</t>

<t>Responder includes SUPPORTED_AUTH_METHODS as defined in <xref target="RFC9593"/> notification include a list of supported authentication methods announcements includes a hybrid authentication announcements with following format:</t>

<figure title="Hybrid Authentication Announcement" anchor="ds-announce"><artwork><![CDATA[
                    1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Length (>3)  |  Auth Method  |   Cert Link 1 | Alg 1 Len     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      AlgorithmIdentifier 1                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 2   | Alg 2 Len     |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
|                                                               |
~                      AlgorithmIdentifier 2                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      ...                                      ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link N   | Alg N Len     |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
|                                                               |
~                      AlgorithmIdentifier N                     ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The announcement include a list algorithms could be used for hybrid signature</t>

<t><list style="symbols">
  <t>Auth Method: A new value to be allocated by IANA</t>
  <t>Cert Link N: Links corresponding signature algorithm N with a particular CA. as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/></t>
  <t>AlgorithmIdentifier N: The variable-length ASN.1 object that is encoded using Distinguished Encoding Rules (DER) <xref target="X.690"/> and identifies the signature algorithm;</t>
</list></t>

<t>Receiver of this announcement could choose one PQC algorithm and one traditional algorithm from the list to create the hybrid signature.</t>

<t>Initiator also includes SUPPORTED_AUTH_METHODS notification in IKE_AUTH request message to announce its support of hybrid authentication.</t>

</section>
<section anchor="auth-payload"><name>AUTH Payload</name>

<t>The IKEv2 AUTH payload has following format as defined in <xref section="3.8" sectionFormat="of" target="RFC7296"/>:</t>

<figure title="AUTH payload" anchor="rfc7296-auth"><artwork><![CDATA[
                        1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Next Payload  |C|  RESERVED   |         Payload Length        |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Auth Method   |                RESERVED                       |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                      Authentication Data                      ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>For hybrid authentication, the AUTH Method has value defined in <xref target="announcement"/></t>

<t>The Authentication Data field follows format defined in <xref section="3" sectionFormat="of" target="RFC7427"/>:</t>

<figure title="Authentication Data in hybrid AUTH payload" anchor="ha-auth-data"><artwork><![CDATA[
                       1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | ASN.1 Length  | AlgorithmIdentifier ASN.1 object              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~        AlgorithmIdentifier ASN.1 object continuing            ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                         Signature Value                       ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The Signature Value is created via following procedure:</t>

<t><list style="numbers" type="1">
  <t>Choose a hash algorithm H from peer's SIGNATURE_HASH_ALGORITHMS, a PQC algorithm Sig1 and a traditional algorithm Sig2 from peer's hybrid authentication method announcement;</t>
  <t>Follow the procedure defined in <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, where the domain separator is the value in <xref section="7.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> correspond to the combination of Sig1, Sig2 and H.</t>
</list></t>

<t>The domain separator is also used as AlgorithmIdentifier in the Authentication Data.</t>

<t>The corresponding certificates of Sig1 and Sig2 <bcp14>MUST</bcp14> be put in the first and second CERT payload, in the order, of the message;</t>

</section>
<section anchor="relatedcertificate"><name>RelatedCertificate</name>
<t>The signing certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension, then the receiver <bcp14>SHOULD</bcp14> verify the extension according to <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>, failed verification <bcp14>SHOULD</bcp14> fail authentication.</t>

</section>
<section anchor="certificate-with-composite-keys"><name>Certificate with Composite Keys</name>
<t>So far, this document assumes the signing certificate contains a key of single algorithm, however there might be certificate with composite key as define in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, in such case, AUTH payload is created with same procedure in <xref target="auth-payload"/>:</t>

<t><list style="symbols">
  <t>Sig1 and Sig2 are specified by the signing certificate</t>
</list></t>

<t>Supported composite signature algorithms are announced via SUPPORTED_AUTH_METHODS notification with 3-Octet announcement as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/>.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security of general PQ/T hybrid authentication is discussed in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>

<t>This document uses mechanisms defined in <xref target="RFC7427"/> and <xref target="RFC9593"/>, the security discussion in the corresponding RFCs also apply.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests a value in "IKEv2 Authentication Method" subregistry under IANA "Internet Key Exchange Version 2 (IKEv2) Parameters" registry</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.ietf-lamps-pq-composite-sigs">
   <front>
      <title>Composite ML-DSA for use in Internet PKI</title>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust Limited</organization>
      </author>
      <author fullname="John Gray" initials="J." surname="Gray">
         <organization>Entrust Limited</organization>
      </author>
      <author fullname="Massimiliano Pala" initials="M." surname="Pala">
         <organization>OpenCA Labs</organization>
      </author>
      <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
         <organization>Bundesdruckerei GmbH</organization>
      </author>
      <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
         <organization>Cisco Systems</organization>
      </author>
      <date day="8" month="July" year="2024"/>
      <abstract>
	 <t>   This document introduces a set of signature schemes that use pairs of
   cryptographic elements such as public keys and signatures to combine
   their security properties.  These schemes effectively mitigate risks
   associated with the adoption of post-quantum cryptography and are
   fully compatible with existing X.509, PKIX, and CMS data structures
   and protocols.  This document defines thirteen specific pairwise
   combinations, namely ML-DSA Composite Schemes, that blend ML-DSA with
   traditional algorithms such as RSA, ECDSA, Ed25519, and Ed448.  These
   combinations are tailored to meet security best practices and
   regulatory requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-02"/>
   
</reference>

<reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
   <front>
      <title>Hybrid signature spectrums</title>
      <author fullname="Nina Bindel" initials="N." surname="Bindel">
         <organization>SandboxAQ</organization>
      </author>
      <author fullname="Britta Hale" initials="B." surname="Hale">
         <organization>Naval Postgraduate School</organization>
      </author>
      <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
         <organization>SandboxAQ</organization>
      </author>
      <author fullname="Florence D" initials="F." surname="D">
         <organization>UK National Cyber Security Centre</organization>
      </author>
      <date day="24" month="May" year="2024"/>
      <abstract>
	 <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatiblity, hybrid generality,
   and simultaneous verification.

   Discussion of this work is encouraged to happen on the IETF PQUIP
   mailing list pqc@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dconnolly/draft-ietf-pquip-hybrid-
   signature-spectrums

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-00"/>
   
</reference>

<reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
   <front>
      <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
      <author fullname="Alison Becker" initials="A." surname="Becker">
         <organization>National Security Agency</organization>
      </author>
      <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
         <organization>National Security Agency</organization>
      </author>
      <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
         <organization>National Security Agency</organization>
      </author>
      <date day="29" month="April" year="2024"/>
      <abstract>
	 <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-05"/>
   
</reference>
<reference anchor="RFC4739">
  <front>
    <title>Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol</title>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <date month="November" year="2006"/>
    <abstract>
      <t>The Internet Key Exchange (IKEv2) protocol supports several mechanisms for authenticating the parties, including signatures with public-key certificates, shared secrets, and Extensible Authentication Protocol (EAP) methods. Currently, each endpoint uses only one of these mechanisms to authenticate itself. This document specifies an extension to IKEv2 that allows the use of multiple authentication exchanges, using either different mechanisms or the same mechanism. This extension allows, for instance, performing certificate-based authentication of the client host followed by an EAP authentication of the user. When backend authentication servers are used, they can belong to different administrative domains, such as the network access provider and the service provider. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4739"/>
  <seriesInfo name="DOI" value="10.17487/RFC4739"/>
</reference>
<reference anchor="RFC7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>
<reference anchor="RFC7427">
  <front>
    <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <author fullname="J. Snyder" initials="J." surname="Snyder"/>
    <date month="January" year="2015"/>
    <abstract>
      <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7427"/>
  <seriesInfo name="DOI" value="10.17487/RFC7427"/>
</reference>
<reference anchor="RFC9593">
  <front>
    <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
    <date month="July" year="2024"/>
    <abstract>
      <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9593"/>
  <seriesInfo name="DOI" value="10.17487/RFC9593"/>
</reference>

<reference anchor="X.690" >
  <front>
    <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8825-1:2021 (E)"/>
  <seriesInfo name="ITU-T" value="Recommendation X.690"/>
</reference>


<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/ipd">
  <front>
    <title>Module-Lattice-Based Digital Signature Standard</title>
    <author >
      <organization></organization>
    </author>
    <date year="2023" month="August"/>
  </front>
  <seriesInfo name="NIST" value="FIPS-204"/>
  <seriesInfo name="State" value="Initial Public Draft"/>
</reference>
<reference anchor="QRPKI" target="https://eprint.iacr.org/2017/460">
  <front>
    <title>Transitioning to a Quantum-Resistant Public Key Infrastructure</title>
    <author initials="N." surname="Bindel" fullname="Nina Bindel">
      <organization></organization>
    </author>
    <author initials="U." surname="Herath" fullname="Udyani Herath">
      <organization></organization>
    </author>
    <author initials="M." surname="McKague" fullname="Mattew McKague">
      <organization></organization>
    </author>
    <author initials="D." surname="Stebila" fullname="Douglas Stebila">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>


<reference anchor="RFC8784">
  <front>
    <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
    <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="D. McGrew" initials="D." surname="McGrew"/>
    <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8784"/>
  <seriesInfo name="DOI" value="10.17487/RFC8784"/>
</reference>
<reference anchor="RFC9370">
  <front>
    <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
    <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
    <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
    <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
    <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
    <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
    <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
    <date month="May" year="2023"/>
    <abstract>
      <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
      <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
      <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9370"/>
  <seriesInfo name="DOI" value="10.17487/RFC9370"/>
</reference>



    </references>

</references>


<?line 298?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

