Re: [IPsec] IPsec with QKD

Rodney Van Meter <rdv@sfc.wide.ad.jp> Mon, 27 October 2014 21:44 UTC

Return-Path: <rdv@sfc.wide.ad.jp>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 197A81A009C for <ipsec@ietfa.amsl.com>; Mon, 27 Oct 2014 14:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.401
X-Spam-Level:
X-Spam-Status: No, score=-99.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g8B9qk4OKTPZ for <ipsec@ietfa.amsl.com>; Mon, 27 Oct 2014 14:44:38 -0700 (PDT)
Received: from mail.sfc.wide.ad.jp (shonan.sfc.wide.ad.jp [IPv6:2001:200:0:8803::53]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EA011A00E9 for <ipsec@ietf.org>; Mon, 27 Oct 2014 14:44:04 -0700 (PDT)
Received: from [192.168.0.2] (cpe-066-057-017-031.nc.res.rr.com [66.57.17.31]) by mail.sfc.wide.ad.jp (Postfix) with ESMTPSA id AC3B827819C; Tue, 28 Oct 2014 06:43:59 +0900 (JST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_2C5D95D6-6E41-4FC4-8961-7D38DBCF7343"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Rodney Van Meter <rdv@sfc.wide.ad.jp>
In-Reply-To: <7134F6D8-587F-4EBA-8E23-C088D8F1EA25@dell.com>
Date: Mon, 27 Oct 2014 17:43:54 -0400
Message-Id: <F09F1AE8-2F25-429D-9756-B134100442C9@sfc.wide.ad.jp>
References: <9FA67F6A-A730-46FC-925E-F16A1B686D73@sfc.wide.ad.jp> <7134F6D8-587F-4EBA-8E23-C088D8F1EA25@dell.com>
To: Paul_Koning@Dell.com
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/ipsec/ONJSGi-kUnkrCWo4ZUBJZM17vbw
Cc: Rodney Van Meter <rdv@sfc.wide.ad.jp>, ipsec@ietf.org, kurosagi@sfc.wide.ad.jp, shigeya@wide.ad.jp
Subject: Re: [IPsec] IPsec with QKD
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Oct 2014 21:44:41 -0000

Yes, you’re correct, we should be more exact there.

Shor’s algorithm solves both (if you believe in large-scale quantum computers).

Classically, I haven’t studied the relationship in depth myself, but this bachelor’s thesis from Harvard seems to be a survey:
http://modular.math.washington.edu/projects/john_gregg_thesis.pdf

		—Rod


On Oct 27, 2014, at 5:30 PM, <Paul_Koning@Dell.com> <Paul_Koning@Dell.com> wrote:

> A nit in section 5:  "The security of Diffie-Hellman depends on the difficulty of the factoring problem”.  More precisely, it depends on the difficulty of the modular discrete log problem, though it may be (I forgot if this is proven or a conjecture) that an efficient solution of that problem can be mapped to/from an efficient solution of the factoring problem.
> 
> paul
> 
> On Oct 27, 2014, at 2:13 PM, Rodney Van Meter <rdv@sfc.wide.ad.jp> wrote:
> 
>> ...
>> * We have just uploaded an -01 of the I-D we wrote, incorporating feedback from several people, including Sean Turner, Sheila Frankel and Alan Mink.
>>   http://datatracker.ietf.org/doc/draft-nagayama-ipsecme-ipsec-with-qkd/?include_text=1
>