Hi Michael, just one clarification (though I don't think it changes your
analysis very much):


> I understand calling this a downgrade attack, but I think it deserves a
> more
> specific name.  Given existence of a CRQC, then it's effectively the same
> as
> at least one end point revealing their private key.
>

You're thinking of the key-compromise impersonation attack. There is also
the identity misbinding attack, which doesn't require either end point to
reveal their key. (Imagine each endpoint is using ML-DSA for signing.). See
[1] for details.

Best,

Chris P.

[1]
https://datatracker.ietf.org/doc/html/draft-smyslov-ipsecme-ikev2-downgrade-prevention-01#section-4-7
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to