Please do.

That this was nonsense was clear already in 2020. Both public-key and symmetric 
crypto should follow the five quantum-resistance security levels defined based 
on symmetric crypto. In addition of taking billions of years, the qubits 
required for a quantum attack on AES-192 would cover the surface area of 
Betelgeuse...

John

From: Thom Wiggers <[email protected]>
Date: Thursday, 19 February 2026 at 15:21
To: [email protected] <[email protected]>
Subject: [IPsec] Symmetric crypto guidance in RFC 8784 is misleading

Hi all,

I was going through the security considerations of RFC 8784 and I saw the 
following:

[…]

In addition, the policy SHOULD be set to negotiate only quantum-secure 
symmetric algorithms; while this RFC doesn't claim to give advice as to what 
algorithms are secure (as that may change based on future cryptographical 
results), below is a list of defined IKEv2 and IPsec algorithms that should not 
be used, as they are known to provide less than 128 bits of post-quantum 
security:

  *   Any IKEv2 encryption algorithm, PRF, or integrity algorithm with a key 
size less than 256 bits.
  *   Any ESP transform with a key size less than 256 bits.
  *   PRF_AES128_XCBC and PRF_AES128_CBC: even though they can use as input a 
key of arbitrary size, such input keys are converted into a 128-bit key for 
internal use.

[…]

By our now more nuanced understanding of Grover’s algorithm (in particular how 
expensive and poorly parallelizable it is), this recommendation is entirely no 
longer necessary. For example, NIST also write that using 128-bit keys is just 
fine.

I’m just not sure if this warrants submitting an erratum.  Should I submit one?

Cheers,

Thom
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to