RFC 9370: Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)
- CJ. Tjhai,
- M. Tomlinson,
- G. Bartlett,
- S. Fluhrer,
- D. Van Geest,
- O. Garcia-Morchon,
- V. Smyslov
Abstract
This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.¶
This document utilizes the IKE
This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.¶
Status of This Memo
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
1.1. Problem Description
The Internet Key Exchange Protocol version 2 (IKEv2), as specified in [RFC7296], uses
the Diffie-Hellman (DH) or the Elliptic Curve Diffie-Hellman (ECDH)
algorithm, which shall be referred to as "(EC)DH" collectively, to
establish a shared secret between an initiator and a responder. The
security of the (EC)DH algorithms relies on the difficulty to solve a
discrete logarithm problem in multiplicative (and, respectively,
elliptic curve) groups when the order of the group parameter is large
enough. While solving such a problem remains infeasible with current
computing power, it is believed that general-purpose quantum
computers will be able to solve this problem, implying that the
security of IKEv2 is compromised. There are, however, a number of
cryptosystems that are conjectured to be resistant to quantum
It is essential to have the ability to perform one or more post-quantum key exchanges in conjunction with an (EC)DH key exchange so that the resulting
shared key is resistant to quantum
1.2. Proposed Extension
This document describes a method to perform multiple successive key
exchanges in IKEv2. This method allows integration of PQC in IKEv2,
while maintaining backward compatibility, to derive a set of IKE keys
that is resistant to quantum
IKE peers perform multiple successive key exchanges to establish an IKE SA. Each exchange produces some shared secret, and these secrets are combined in a way such that:¶
- (a)
- the final shared secret is computed from all of the component key exchange secrets;¶
- (b)
- unless both peers support and agree to use the additional key exchanges introduced in this specification, the final shared secret equivalent to the shared secret specified in [RFC7296] is obtained; and¶
- (c)
- if any part of the component key exchange method is a post-quantum algorithm, the final shared secret is post-quantum secure.¶
Some post-quantum key exchange payloads may have sizes larger than
the standard maximum transmission unit (MTU) size. Therefore, there
could be issues with fragmentation at the IP layer. In order to allow
the use of those larger payload sizes, this mechanism relies on the
IKE
While this extension is primarily aimed at IKE SAs due to the
potential fragmentation issue discussed above, it also applies to
CREATE_CHILD_SA exchanges as illustrated in Section 2.2.4 for
creating
Note that readers should consider the approach defined in this document as providing a long-term solution in upgrading the IKEv2 protocol to support post-quantum algorithms. A short-term solution to make IKEv2 key exchange quantum secure is to use post-quantum pre-shared keys as specified in [RFC8784].¶
Note also that the proposed approach of performing multiple successive key exchanges in such a way, when the resulting session keys depend on all of them, is not limited to only addressing the threat of quantum computers. It can also be used when all of the performed key exchanges are classical (EC)DH primitives, where, for various reasons (e.g., policy requirements), it is essential to perform multiple key exchanges.¶
This specification does not attempt to address key exchanges with KE payloads longer than 64 KB; the current IKE payload format does not allow such a possibility. At the time of writing, it appears likely that there are a number of key exchanges available that would not have such a requirement. [BEYOND-64K] discusses approaches that could be taken to exchange huge payloads if such a requirement were needed.¶
1.3. Document Organization
The remainder of this document is organized as follows. Section 2 describes how multiple key exchanges are performed between two IKE peers and how keying materials are derived for both SAs and Child SAs. Section 3 discusses IANA considerations for the namespaces introduced in this document. Section 4 discusses security considerations. In the Appendices, some examples of multiple key exchanges are illustrated in Appendix A. Appendix B summarizes design criteria and alternative approaches that have been considered. These approaches are later discarded, as described in Appendix C.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
2. Multiple Key Exchanges
2.1. Design Overview
Most post-quantum key agreement algorithms are relatively new. Thus, they are not fully trusted. There are also many proposed algorithms that have different trade-offs and that rely on different hard problems. The concern is that some of these hard problems may turn out to be easier to solve than anticipated; thus, the key agreement algorithm may not be as secure as expected. A hybrid solution, when multiple key exchanges are performed and the calculated shared key depends on all of them, allows us to deal with this uncertainty by combining a classical key exchange with a post-quantum one, as well as leaving open the possibility of combining it with multiple post-quantum key exchanges.¶
In order to be able to use IKE fragmentation [RFC7383] for those key exchanges that may
have long public keys, this specification utilizes the
IKE
Note that this document assumes that each key exchange method
requires one round trip and consumes exactly one IKE
In order to minimize communication overhead, only the key shares that are agreed upon are actually exchanged. To negotiate additional key exchanges, seven new Transform Types are defined. These transforms and Transform Type 4 share the same Transform IDs.¶
It is assumed that new Transform Type 4 identifiers will be assigned later for various post-quantum key exchanges [IKEV2TYPE4ID]. This specification does not make a distinction between classical (EC)DH and post-quantum key exchanges, nor between post-quantum algorithms that are true key exchanges and post-quantum algorithms that act as key transport mechanisms: all are treated equivalently by the protocol. This document renames a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". This document also renames Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)". The corresponding renaming to the IANA registry is described in Section 3.¶
The fact that newly defined transforms share the same registry for possible Transform IDs with Transform Type 4 allows additional key exchanges to be of any type: either post-quantum or classical (EC)DH. This approach allows any combination of the defined key exchange methods to take place. This also allows IKE peers to perform a single post-quantum key exchange in the IKE_SA_INIT without additional key exchanges, provided that the IP fragmentation is not an issue and that hybrid key exchange is not needed.¶
The SA payload in the IKE_SA_INIT message includes one or more newly defined transforms that represent the extra key exchange policy required by the initiator. The responder follows the usual IKEv2 negotiation rules: it selects a single transform of each type and returns all of them in the IKE_SA_INIT response message.¶
Then, provided that additional key exchanges are negotiated, the
initiator and the responder perform one or more IKE
2.2. Protocol Details
In the simplest case, the initiator starts a single key exchange (and has no interest in supporting multiple), and it is not concerned with possible fragmentation of the IKE_SA_INIT messages (because either the key exchange that it selects is small enough not to fragment or the initiator is confident that fragmentation will be handled either by IP fragmentation or by transport via TCP).¶
In this case, the initiator performs the IKE_SA_INIT for a single key exchange using a Transform Type 4 (possibly with a post-quantum algorithm) and including the initiator KE payload. If the responder accepts the policy, it responds with an IKE_SA_INIT response, and IKE continues as usual.¶
If the initiator wants to negotiate multiple key exchanges, then the initiator uses the protocol behavior listed below.¶
2.2.1. IKE_SA_INIT Round: Negotiation
Multiple key exchanges are negotiated using the standard IKEv2
mechanism via SA payload. For this purpose, seven new transform
types are defined: Additional Key Exchange 1 (ADDKE1) with IANA-assigned value
6, Additional Key Exchange 2 (ADDKE2) (7), Additional Key Exchange 3 (ADDKE3) (8),
Additional Key Exchange 4 (ADDKE4) (9), Additional Key Exchange 5 (ADDKE5) (10),
Additional Key Exchange 6 (ADDKE6) (11), and Additional Key Exchange 7 (ADDKE7) (12).
They are collectively called "Additional Key Exchange (ADDKE)
Transform Types" in this document and have slightly different semantics
than the existing IKEv2 Transform Types. They are interpreted as an
indication of additional key exchange methods that peers agree to
perform in a series of IKE
The key exchange method negotiated via Transform Type 4 always
takes place in the IKE_SA_INIT exchange, as defined in [RFC7296]. Additional key exchanges
negotiated via newly defined transforms MUST take
place in a series of IKE
With these semantics, note that ADDKE Transform Types are not associated with any particular type of key exchange and do not have any Transform IDs that are specific per Transform Type IANA registry. Instead, they all share a single registry for Transform IDs, namely "Transform Type 4 - Key Exchange Method Transform IDs". All key exchange algorithms (both classical or post-quantum) should be added to this registry. This approach gives peers flexibility in defining the ways they want to combine different key exchange methods.¶
When forming a proposal, the initiator adds transforms for the IKE_SA_INIT exchange using Transform Type 4. In most cases, they will contain classical (EC)DH key exchange methods, but that is not a requirement. Additional key exchange methods are proposed using ADDKE Transform Types. All of these transform types are optional; the initiator is free to select any of them for proposing additional key exchange methods. Consequently, if none of the ADDKE Transform Types are included in the proposal, then this proposal indicates the performing of standard IKEv2, as defined in [RFC7296]. On the other hand, if the initiator includes any ADDKE Transform Type in the proposal, the responder MUST select one of the algorithms proposed using this type. Note that this is not a new requirement; this behavior is already specified in Section 2.7 of [RFC7296]. A Transform ID NONE MAY be added to those transform types that contain key exchange methods which the initiator believes are optional according to its local policy.¶
The responder performs the negotiation using the standard IKEv2
procedure described in Section 3.3 of [RFC7296]. However, for the ADDKE Transform Types,
the responder's choice MUST NOT contain duplicated
algorithms (those with an identical Transform ID and attributes),
except for the Transform ID of NONE. An algorithm is represented as
a transform. In some cases, the transform could include a set of
associated attributes that define details of the algorithm. In this
case, two transforms can be the same, but the attributes must be
different. Additionally, the order of the attributes does not
affect the equality of the algorithm, so the following two
transforms define the same algorithm:
"ID=alg1, ATTR1=attr1, ATTR2=attr2" and
"ID=alg1, ATTR2=attr2, ATTR1=attr1". If the
responder is unable to select algorithms that are not duplicated for each
proposed key exchange (either because the proposal contains too few
choices or due to the local policy restrictions on using the
proposed algorithms), then the responder MUST reject
the message with an error notification of type NO
If the responder selects NONE for some ADDKE
Transform Types (provided they are proposed by the initiator), then any
corresponding additional key exchanges MUST NOT take place.
Therefore, if the
initiator includes NONE in all of the ADDKE
Transform Types and the responder selects this value for all of them,
then no IKE
The initiator MAY propose ADDKE Transform Types that are not consecutive, for example, proposing ADDKE2 and ADDKE5 Transform Types only. The responder MUST treat all of the omitted ADDKE transforms as if they were proposed with Transform ID NONE.¶
Below is an example of the SA payload in the initiator's IKE_SA_INIT request message. Here, the abbreviation "KE" is used for the Key Exchange transform, which this document renames from the Diffie-Hellman Group transform. Additionally, the notations PQ_KEM_1, PQ_KEM_2, and PQ_KEM_3 are used to represent Transform IDs that have yet to be defined of some popular post-quantum key exchange methods.¶
In this example, the initiator proposes performing the initial key exchange using a 4096-bit MODP Group followed by two mandatory additional key exchanges (i.e., ADDKE2 and ADDKE3 Transform Types) using PQ_KEM_1 and PQ_KEM_2 methods in any order followed by an additional key exchange (i.e., ADDKE5 Transform Type) using the PQ_KEM_3 method that may be omitted.¶
The responder might return the following SA payload, indicating that it agrees to perform two additional key exchanges, PQ_KEM_2 followed by PQ_KEM_1, and that it does not want to additionally perform PQ_KEM_3.¶
If the initiator includes any ADDKE Transform
Types into the SA payload in the IKE_SA_INIT exchange request
message, then it MUST also negotiate the use of the
IKE
It is possible for an attacker to manage to send a response to the initiator's IKE_SA_INIT request before the legitimate responder does. If the initiator continues to create the IKE SA using this response, the attempt will fail. Implementers may wish to consider strategies as described in Section 2.4 of [RFC7296] to handle such an attack.¶
2.2.2. IKE_INTERMEDIATE Round: Additional Key Exchanges
For each additional key exchange agreed to in the IKE_SA_INIT exchange,
the initiator and the responder perform an IKE
The initiator sends key exchange data in the KEi(n) payload.
This message is protected with the current SK_ei/SK_ai keys. The
notation "KEi(n)" denotes the n-th IKE
On receiving this, the responder sends back key exchange payload
KEr(n); "KEr(n)" denotes the n-th IKE
The former "Diffie-Hellman Group Num" (now called "Key Exchange Method") field in the KEi(n) and KEr(n) payloads MUST match the n-th negotiated additional key exchange.¶
Once this exchange is done, both sides compute an updated keying material:¶
From this exchange, SK(n) is the resulting shared secret. Ni and Nr are nonces from the IKE_SA_INIT exchange.
SK_d(n-1) is the last generated SK_d (derived from IKE_SA_INIT
for the first use of IKE
Both the initiator and the responder use these updated key
values in the next exchange
2.2.3. IKE_AUTH Exchange
After all IKE
2.2.4. CREATE_CHILD_SA Exchange
The CREATE_CHILD_SA exchange is used in IKEv2 for the purposes of creating additional Child SAs, rekeying these Child SAs, and rekeying IKE SA itself. When creating or rekeying Child SAs, the peers may optionally perform a key exchange to add a fresh entropy into the session keys. In the case of an IKE SA rekey, the key exchange is mandatory. Peers supporting this specification may want to use multiple key exchanges in these situations.¶
Using multiple key exchanges with a CREATE_CHILD_SA exchange is
negotiated in a similar fashion to the initial IKE exchange, see Section 2.2.1. If the initiator includes
any ADDKE Transform Types in the SA payload (along with
Transform Type 4), and if the responder agrees to perform additional
key exchanges, then the additional key exchanges are performed in a
series of new IKE_FOLLOWUP_KE exchanges that follow the
CREATE_CHILD_SA exchange. The IKE_FOLLOWUP_KE exchange is introduced especially for
transferring data of additional key exchanges following the one
performed in the CREATE
The key exchange negotiated via Transform Type 4 always takes place in the CREATE_CHILD_SA exchange, as per the IKEv2 specification [RFC7296]. Additional key exchanges are performed in an order of the values of their Transform Types so that the key exchange negotiated using Additional Key Exchange i always precedes the key exchange negotiated using Additional Key Exchange i + 1. Each additional key exchange method MUST be fully completed before the next one is started. Note that this document assumes that each key exchange method consumes exactly one IKE_FOLLOWUP_KE exchange. For the methods that require multiple round trips, a separate document should define how such methods are split into several IKE_FOLLOWUP_KE exchanges.¶
After an IKE SA is created, the window size may be greater than one; thus, multiple concurrent exchanges may be in progress. Therefore, it is
essential to link the IKE_FOLLOWUP_KE exchanges together with the
corresponding CREATE_CHILD_SA exchange. Once an IKE SA is created, all IKE
exchanges are independent and IKEv2 doesn't have a built-in mechanism to link an exchange
with another one. A new status type notification called
"ADDITIONAL
The responder MUST include this notification in a CREATE_CHILD_SA or IKE_FOLLOWUP_KE response message in case the next IKE_FOLLOWUP_KE exchange is expected, filling it with some data that would allow linking the current exchange to the next one. The initiator MUST send back this notification intact in the request message of the next IKE_FOLLOWUP_KE exchange.¶
Below is an example of CREATE_CHILD_SA exchange followed by three additional key exchanges.¶
The former "Diffie-Hellman Group Num" (now called "Key Exchange Method") field in the KEi(n) and KEr(n) payloads MUST match the n-th negotiated additional key exchange.¶
Due to some unexpected events (e.g., a reboot), it is possible that the initiator may lose its state, forget that it is in the process of performing additional key exchanges, and never start the remaining IKE_FOLLOWUP_KE exchanges. The responder MUST handle this situation gracefully and delete the associated state if it does not receive the next expected IKE_FOLLOWUP_KE request after some reasonable period of time. Due to various factors such as computational resource and key exchange algorithm used, note that it is not possible to give normative guidance on how long this timeout period should be. In general, 5-20 seconds of waiting time should be appropriate in most cases.¶
It may also take too long for the initiator to prepare
and to send the next IKE_FOLLOWUP_KE request, or, due to the
network conditions, the request could be lost and retransmitted.
In
this case, the message may reach the responder when it has already
deleted the associated state, following the advice above. If the
responder receives an IKE_FOLLOWUP_KE message for which it does not
have a key exchange state, it MUST send back a new
error type notification called "STATE
It is possible that the peers start rekeying the IKE SA or the Child SA at the same time, which is called "simultaneous rekeying". Sections 2.8.1 and 2.8.2 of [RFC7296] describe how IKEv2 handles this situation. In a nutshell, IKEv2 follows the rule that, in the case of simultaneous rekeying, if two identical new IKE SAs (or two pairs of Child SAs) are created, then one of them should be deleted. Which one to delete is determined by comparing the values of four nonces that are used in the colliding CREATE_CHILD_SA exchanges. The IKE SA (or pair of Child SAs) created by the exchange in which the smallest nonce is used should be deleted by the initiator of this exchange.¶
With multiple key exchanges, the SAs are not yet created when the CREATE_CHILD_SA is completed. Instead, they would be created only after the series of IKE_FOLLOWUP_KE exchanges is finished. For this reason, if additional key exchanges are negotiated in the CREATE_CHILD_SA exchange in which the smallest nonce is used, then, because there is nothing to delete yet, the initiator of this exchange just stops the rekeying process, and it MUST NOT initiate the IKE_FOLLOWUP_KE exchange.¶
In most cases, rekey collisions are resolved in the
CREATE_CHILD_SA exchange. However, a situation may occur when, due
to packet loss, one of the peers receives the CREATE_CHILD_SA
message requesting the rekey of an SA that is already being rekeyed by
this peer (i.e., the CREATE_CHILD_SA exchange initiated by this peer
has already been completed, and the series of IKE_FOLLOWUP_KE
exchanges is in progress). In this case, a TEMPORARY
If multiple key exchanges are negotiated in the CREATE_CHILD_SA exchange, then the resulting keys are computed as follows.¶
In the case of an IKE SA rekey:¶
In the case of a Child SA creation or rekey:¶
In both cases, SK_d is from the existing IKE SA; SK(0), Ni, and
Nr are the shared key and nonces from the CREATE
2.2.5. Interaction with IKEv2 Extensions
It is believed that this specification requires no modification to the IKEv2 extensions defined so far. In particular, the IKE SA resumption mechanism defined in [RFC5723] can be used to resume IKE SAs created using this specification.¶
2.2.5.1. Interaction with Childless IKE SA
It is possible to establish IKE SAs with post-quantum algorithms by
only using IKE_FOLLOWUP_KE exchanges and without the use of
IKE
It is also possible for the initiator to send proposals without any ADDKE Transform Types in the IKE_SA_INIT message. In this instance, the responder will have no information about whether or not the initiator supports the extension in this specification. This may not be efficient, as the responder will have to wait for the subsequent CREATE_CHILD_SA request to determine whether or not the initiator's request is appropriate for its local policy.¶
The support for childless IKE SA is not negotiated, but it is
the responder that indicates the support for this mode. As such,
the responder cannot enforce that the initiator use this mode.
Therefore, it is entirely possible that the initiator does not
support this extension and sends IKE_AUTH request as per [RFC7296] instead of [RFC6023]. In this case, the responder
may respond with an error that is not fatal, such as the NO
Note that if the initial IKE SA is used to transfer sensitive information, then this information will not be protected using the additional key exchanges, which may use post-quantum algorithms. In this arrangement, the peers will have to use post-quantum algorithm in Transform Type 4 in order to mitigate the risk of quantum attack.¶
3. IANA Considerations
This document adds a new exchange type into the "IKEv2 Exchange Types" registry:¶
This document renames Transform Type 4 defined in the "Transform Type Values" registry from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)".¶
This document renames the IKEv2 registry originally titled "Transform Type 4 - Diffie-Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs".¶
This document adds the following Transform Types to the "Transform Type Values" registry:¶
This document defines a new Notify Message Type in the "IKEv2 Notify Message Types - Status Types" registry:¶
This document also defines a new Notify Message Type in the "IKEv2 Notify Message Types - Error Types" registry:¶
IANA has added the following instructions for designated experts for the "Transform Type 4 - Key Exchange Method Transform IDs" subregistry:¶
IANA has also completed the following changes. It is assumed that [RFC9370] refers to this specification.¶
4. Security Considerations
The extension in this document is intended to mitigate two possible threats in IKEv2: the compromise of (EC)DH key exchange using Shor's algorithm while remaining backward compatible and the potential compromise of existing or future PQC key exchange algorithms. To address the former threat, this extension allows the establishment of a shared secret by using multiple key exchanges: typically, one classical (EC)DH and the other one post-quantum algorithm. In order to address the latter threat, multiple key exchanges using a post-quantum algorithm can be performed to form the shared key.¶
Unlike key exchange methods (Transform Type 4), the Encryption Algorithm (Transform Type 1), the Pseudorandom Function (Transform Type 2), and the Integrity Algorithm (Transform Type 3) are not susceptible to Shor's algorithm. However, they are susceptible to Grover's attack [GROVER], which allows a quantum computer to perform a brute force key search, using quadratically fewer steps than the classical counterpart. Simply increasing the key length can mitigate this attack. It was previously believed that one needed to double the key length of these algorithms. However, there are a number of factors that suggest that it is quite unlikely to achieve the quadratic speedup using Grover's algorithm. According to NIST [NISTPQCFAQ], current applications can continue using an AES algorithm with the minimum key length of 128 bits. Nevertheless, if the data needs to remain secure for many years to come, one may want to consider using a longer key size for the algorithms in Transform Types 1-3.¶
SKEYSEED is calculated from shared SK(x), using an algorithm defined in Transform Type 2. While a quantum attacker may learn the value of SK(x), if this value is obtained by means of a classical key exchange, other SK(x) values generated by means of a post-quantum algorithm ensure that the final SKEYSEED is not compromised. This assumes that the algorithm defined in the Transform Type 2 is quantum resistant.¶
The ordering of the additional key exchanges should not matter in general, as only the final shared secret is of interest. Nonetheless, because the strength of the running shared secret increases with every additional key exchange, an implementer may want to first perform the most secure method (in some metrics) followed by less secure methods.¶
The main focus of this document is to prevent a passive attacker from
performing a "harvest
Performing multiple key exchanges while establishing an IKE SA increases the responder's susceptibility to DoS attacks because of an increased amount of resources needed before the initiator is authenticated. This is especially true for post-quantum key exchange methods, where many of them are more memory and/or CPU intensive than the classical counterparts.¶
Responders may consider recommendations from [RFC8019] to deal with increased DoS-attack susceptibility. It
is also possible that the responder only agrees to create an initial IKE SA
without performing additional key exchanges if the initiator includes
such an option in its proposals. Then, peers immediately rekey the
initial IKE SA with the CREATE_CHILD_SA exchange, and additional key
exchanges are performed via the IKE_FOLLOWUP_KE exchanges. In this
case, at the point when resource
5. References
5.1. Normative References
- [RFC2119]
-
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10
.17487 , , <https:///RFC2119 www >..rfc -editor .org /info /rfc2119 - [RFC7296]
-
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", STD 79, RFC 7296, DOI 10
.17487 , , <https:///RFC7296 www >..rfc -editor .org /info /rfc7296 - [RFC8174]
-
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10
.17487 , , <https:///RFC8174 www >..rfc -editor .org /info /rfc8174 - [RFC9242]
-
Smyslov, V., "Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2)", RFC 9242, DOI 10
.17487 , , <https:///RFC9242 www >..rfc -editor .org /info /rfc9242
5.2. Informative References
- [BEYOND-64K]
-
Tjhai, CJ., Heider, T., and V. Smyslov, "Beyond 64KB Limit of IKEv2 Payloads", Work in Progress, Internet-Draft, draft
-tjhai , , <https://-ikev2 -beyond -64k -limit -03 datatracker >..ietf .org /doc /html /draft -tjhai -ikev2 -beyond -64k -limit -03 - [G-IKEV2]
-
Smyslov, V. and B. Weis, "Group Key Management using IKEv2", Work in Progress, Internet-Draft, draft
-ietf , , <https://-ipsecme -g -ikev2 -09 datatracker >..ietf .org /doc /html /draft -ietf -ipsecme -g -ikev2 -09 - [GROVER]
-
Grover, L., "A fast quantum mechanical algorithm for database search", Proc. of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing (STOC), pp. 212-219, DOI 10
.48550 , , <https:///ar Xiv .quant -ph /9605043 doi >..org /10 .48550 /ar Xiv .quant -ph /9605043 - [IKEV2TYPE4ID]
-
IANA, "Internet Key Exchange Version 2 (IKEv2) Parameters: Transform Type 4 - Diffie-Hellman Group Transform IDs", <https://
www >..iana .org /assignments /ikev2 -parameters / - [NISTPQCFAQ]
-
NIST, "Post-Quantum Cryptography Standard", , <https://
csrc >..nist .gov /Projects /post -quantum -cryptography /faqs - [RFC5723]
-
Sheffer, Y. and H. Tschofenig, "Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption", RFC 5723, DOI 10
.17487 , , <https:///RFC5723 www >..rfc -editor .org /info /rfc5723 - [RFC6023]
-
Nir, Y., Tschofenig, H., Deng, H., and R. Singh, "A Childless Initiation of the Internet Key Exchange Version 2 (IKEv2) Security Association (SA)", RFC 6023, DOI 10
.17487 , , <https:///RFC6023 www >..rfc -editor .org /info /rfc6023 - [RFC7383]
-
Smyslov, V., "Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation", RFC 7383, DOI 10
.17487 , , <https:///RFC7383 www >..rfc -editor .org /info /rfc7383 - [RFC8019]
-
Nir, Y. and V. Smyslov, "Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial
-of , RFC 8019, DOI 10-Service Attacks" .17487 , , <https:///RFC8019 www >..rfc -editor .org /info /rfc8019 - [RFC8247]
-
Nir, Y., Kivinen, T., Wouters, P., and D. Migault, "Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)", RFC 8247, DOI 10
.17487 , , <https:///RFC8247 www >..rfc -editor .org /info /rfc8247 - [RFC8784]
-
Fluhrer, S., Kampanakis, P., McGrew, D., and V. Smyslov, "Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security", RFC 8784, DOI 10
.17487 , , <https:///RFC8784 www >..rfc -editor .org /info /rfc8784
Appendix A. Sample Multiple Key Exchanges
This appendix shows some examples of multiple key exchanges. These examples are not normative, and they describe some message flow scenarios that may occur in establishing an IKE or Child SA. Note that some payloads that are not relevant to multiple key exchanges may be omitted for brevity.¶
A.1. IKE_INTERMEDIATE Exchanges Carrying Additional Key Exchange Payloads
The exchanges below show that the initiator proposes the use of additional key exchanges to establish an IKE SA. The initiator proposes three sets of additional key exchanges, all of which are optional. Therefore, the responder can choose NONE for some or all of the additional exchanges if the proposed key exchange methods are not supported or for whatever reasons the responder decides not to perform the additional key exchange.¶
In this particular example, the responder chooses to perform two
additional key exchanges. It selects PQ_KEM_2, NONE, and PQ_KEM_5 for
the first, second, and third additional key exchanges, respectively. As
per [RFC7296], a set of
keying materials is derived, in particular SK_d, SK_a[i/r], and
SK_e[i/r]. Both peers then perform an IKE
The updated SKEYSEED value is then used to derive the following keying materials.¶
As per [RFC9242], both peers compute IntAuth_i1 and IntAuth_r1 using the SK_pi(1) and SK_pr(1) keys, respectively. These values are required in the IKE_AUTH phase of the exchange.¶
In the next IKE
In this update, SK(2) is the shared secret from the third additional key exchange, i.e., PQ_KEM_5. Then, both peers compute the values of IntAuth_[i/r]2 using the SK_p[i/r](2) keys.¶
After the completion of the second IKE
A.2. No Additional Key Exchange Used
The initiator proposes two sets of optional additional key
exchanges, but the responder does not support any of them. The
responder chooses NONE for each set. Consequently, the
IKE
A.3. Additional Key Exchange in the CREATE_CHILD_SA Exchange Only
The exchanges below show that the initiator does not propose the
use of additional key exchanges to establish an IKE SA, but they are
required in order to establish a Child SA. In order to establish a
fully quantum
A.4. No Matching Proposal for Additional Key Exchanges
The initiator proposes the combination of PQ_KEM_1, PQ_KEM_2,
PQ_KEM_3, and PQ_KEM_4 as the additional key exchanges. The initiator
indicates that either PQ_KEM_1 or PQ_KEM_2 must be used to establish
an IKE SA, but ADDKE2 Transform Type is optional. Therefore, the
responder can either select PQ_KEM_3 or PQ_KEM_4 or omit this key
exchange by selecting NONE. Although the responder supports the
optional PQ_KEM_3 and PQ_KEM_4 methods, it does not support
either the PQ_KEM_1 or the PQ_KEM_2 mandatory method; therefore, it responds
with a NO
Appendix B. Design Criteria
The design of the extension is driven by the following criteria:¶
- 1)
-
Need for PQC in IPsec¶
Quantum computers, which might become feasible in the near future, pose a threat to our classical public key cryptography. PQC, a family of public key cryptography that is believed to be resistant to these computers, needs to be integrated into the IPsec protocol suite to restore confidentiality and authenticity.¶
- 2)
-
Hybrid¶
There is currently no post-quantum key exchange that is trusted at the level that (EC)DH is trusted for defending against conventional (non-quantum) adversaries. A hybrid post-quantum algorithm to be introduced, along with the well
-established primitives, addresses this concern, since the overall security is at least as strong as each individual primitive.¶ - 3)
-
Focus on post-quantum confidentiality¶
A passive attacker can store all monitored encrypted IPsec communication today and decrypt it once a quantum computer is available in the future. This attack can have serious consequences that will not be visible for years to come. On the other hand, an attacker can only perform active attacks, such as impersonation of the communicating peers, once a quantum computer is available sometime in the future. Thus, this specification focuses on confidentiality due to the urgency of this problem and presents a defense against the serious attack described above, but it does not address authentication because it is less urgent at this stage.¶
- 4)
-
Limit the amount of exchanged data¶
The protocol design should be such that the amount of exchanged data, such as public keys, is kept as small as possible, even if the initiator and the responder need to agree on a hybrid group or if multiple public keys need to be exchanged.¶
- 5)
-
Not post-quantum specific¶
Any cryptographic algorithm could be potentially broken in the future by currently unknown or impractical attacks. Quantum computers are merely the most concrete example of this. The design does not categorize algorithms as "post-quantum" or "non
-post -quantum", nor does it create assumptions about the properties of the algorithms; meaning that if algorithms with different properties become necessary in the future, this extension can be used unchanged to facilitate migration to those algorithms.¶ - 6)
-
Limited amount of changes¶
A key goal is to limit the number of changes required when enabling a post-quantum handshake. This ensures easier and quicker adoption in existing implementations
. ¶ - 7)
-
Localized changes¶
Another key requirement is that changes to the protocol are limited in scope, in particular, limiting changes in the exchanged messages and in the state machine, so that they can be easily implemented.¶
- 8)
-
Deterministic operation¶
This requirement means that the hybrid post-quantum exchange and, thus, the computed keys will be based on algorithms that both client and server wish to support.¶
- 9)
-
Fragmentation support¶
Some PQC algorithms could be relatively bulky and might require fragmentation. Thus, a design goal is the adaptation and adoption of an existing fragmentation method or the design of a new method that allows for the fragmentation of the key shares.¶
- 10)
-
Backward compatibility and interoperabilit
y ¶ This is a fundamental requirement to ensure that hybrid post-quantum IKEv2 and standard IKEv2 implementations as per [RFC7296] are interoperable.¶
- 11)
-
Compliance with USA Federal Information Processing Standards (FIPS)¶
IPsec is widely used in Federal Information Systems, and FIPS certification is an important requirement. However, at the time of writing, none of the algorithms that is believed to be post-quantum is yet FIPS compliant. Nonetheless, it is possible to combine this post-quantum algorithm with a FIPS-compliant key establishment method so that the overall design remains FIPS compliant [NISTPQCFAQ].¶
- 12)
-
Ability to use this method with multiple classical (EC)DH key exchanges¶
In some situations, peers have no single, mutually trusted, key exchange algorithm (e.g., due to local policy restrictions). The ability to combine two (or more) key exchange methods in such a way that the resulting shared key depends on all of them allows peers to communicate in this situation.¶
Appendix C. Alternative Design
This section gives an overview on a number of alternative approaches that have been considered but later discarded. These approaches are as follows.¶
Acknowledgements
The authors would like to thank Frederic Detienne and Olivier Pelerin for their comments and suggestions, including the idea to negotiate the post-quantum algorithms using the existing KE payload. The authors are also grateful to Tobias Heider and Tobias Guggemos for valuable comments. Thanks to Paul Wouters for reviewing the document.¶