> On Aug 19, 2015, at 1:32 PM, Mike Borza <[email protected]> wrote:
>
> They don't mention IKEv2. I don't know IKEv2 well enough to know whether
> there are any symmetric PSK authentication schemes, but if not, perhaps there
> should be. The point they're making is that the ECC-based authentication
> methods become insecure when quantum computers of sufficient power become
> available, and in light of recent progress in the field the indications are
> that they will become available in a reasonably short timeframe. (And they
> should know that timeframe better than just about anybody else.) I view this
> as an indication that they believe there may be viable QCs of that capability
> in the five to ten years timeframe.
Could you point to references that discuss real quantum computers? I spent a
while reading on this subject within the past year, and as far as I could tell,
quantum computers are a very interesting theory but none yet exist in practice.
I looked for a description of thise “Suite B algorithms” but it wasn’t obvious.
Doesn’t PSK involve Diffie-Hellman key agreement? I thought that Shor’s
algorithm (or a generalization of it) addresses the discrete log problem.
paul
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec