Hello IPSEC, I support adoption. The document is well-written and is having broader adoption.
Best, Peter > -----Original Message----- > From: Tero Kivinen via Datatracker <[email protected]> > Sent: Tuesday, January 13, 2026 2:10 AM > To: [email protected]; [email protected]; draft-wang-ipsecme-hybrid-kem- > [email protected] > Subject: [IPsec] Call for adoption: draft-wang-ipsecme-hybrid-kem-ikev2-frodo- > 03 (Ends 2026-02-09) > > This message starts a ipsecme WG Call for Adoption of: > draft-wang-ipsecme-hybrid-kem-ikev2-frodo-03 > > This Working Group Call for Adoption ends on 2026-02-09 > > Abstract: > Multiple key exchanges in the Internet Key Exchange Protocol Version > 2 (IKEv2) [RFC9370] specifies a framework, which supports multiple > key encapsulation mechanisms (KEMs) in IKEv2 by allowing up to 7 > layers of additional KEMs to derive the final shared secret keys for > IPsec protocols. The primary goal is to mitigate the “harvest now > and decrypt later” threat posed by Cryptographically Relevant Quantum > Computers(CRQCs). For this purpose, one or more post-quantum KEMs > are usually performed in addition to the traditional (EC)DH key > exchange. This draft specifies how the post-quantum KEM algorithm > FrodoKEM is instantiated for IKEv2 as an additional key exchange > mechanism. > > [EDNOTE: IANA KE code points for FrodoKEM may need to be assigned, as > the code points for ML-KEM has been considered in [W-D.K25]. ] > > Please reply to this message and indicate whether or not you support adoption > of this Internet-Draft by the ipsecme WG. Comments to explain your > preference are greatly appreciated. Please reply to all recipients of this > message and include this message in your response. > > Authors, and WG participants in general, are reminded of the Intellectual > Property Rights (IPR) disclosure obligations described in BCP 79 [2]. > Appropriate IPR disclosures required for full conformance with the provisions > of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any. > Sanctions available for application to violators of IETF IPR Policy can be > found > at [3]. > > Thank you. > [1] https://datatracker.ietf.org/doc/bcp78/ > [2] https://datatracker.ietf.org/doc/bcp79/ > [3] https://datatracker.ietf.org/doc/rfc6701/ > > The IETF datatracker status page for this Internet-Draft is: > https://datatracker.ietf.org/doc/draft-wang-ipsecme-hybrid-kem-ikev2-frodo/ > > There is also an HTML version available at: > https://www.ietf.org/archive/id/draft-wang-ipsecme-hybrid-kem-ikev2-frodo- > 03.html > > A diff from the previous version is available at: > https://author-tools.ietf.org/iddiff?url2=draft-wang-ipsecme-hybrid-kem- > ikev2-frodo-03 _______________________________________________ IPsec mailing list -- [email protected] To unsubscribe send an email to [email protected]
