Hi all,

I was going through the security considerations of RFC 8784 and I saw the 
following:

[…]
In addition, the policy SHOULD be set to negotiate only quantum-secure 
symmetric algorithms; while this RFC doesn't claim to give advice as to what 
algorithms are secure (as that may change based on future cryptographical 
results), below is a list of defined IKEv2 and IPsec algorithms that should not 
be used, as they are known to provide less than 128 bits of post-quantum 
security:

Any IKEv2 encryption algorithm, PRF, or integrity algorithm with a key size 
less than 256 bits.
Any ESP transform with a key size less than 256 bits.
PRF_AES128_XCBC and PRF_AES128_CBC: even though they can use as input a key of 
arbitrary size, such input keys are converted into a 128-bit key for internal 
use.
[…]

By our now more nuanced understanding of Grover’s algorithm (in particular how 
expensive and poorly parallelizable it is), this recommendation is entirely no 
longer necessary. For example, NIST also write that using 128-bit keys is just 
fine. 

I’m just not sure if this warrants submitting an erratum.  Should I submit one?

Cheers,

Thom
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to