> On Aug 19, 2015, at 1:32 PM, Mike Borza <[email protected]> wrote:
> 
> They don't mention IKEv2.  I don't know IKEv2 well enough to know whether 
> there are any symmetric PSK authentication schemes, but if not, perhaps there 
> should be.  The point they're making is that the ECC-based authentication 
> methods become insecure when quantum computers of sufficient power become 
> available, and in light of recent progress in the field the indications are 
> that they will become available in a reasonably short timeframe. (And they 
> should know that timeframe better than just about anybody else.)  I view this 
> as an indication that they believe there may be viable QCs of that capability 
> in the five to ten years timeframe.

Could you point to references that discuss real quantum computers?  I spent a 
while reading on this subject within the past year, and as far as I could tell, 
quantum computers are a very interesting theory but none yet exist in practice.

I looked for a description of thise “Suite B algorithms” but it wasn’t obvious.

Doesn’t PSK involve Diffie-Hellman key agreement?  I thought that Shor’s 
algorithm (or a generalization of it) addresses the discrete log problem.

        paul
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to