Re: [IPsec] Proposed method to achieve quantum resistant IKEv2

Cen Jung Tjhai <CJT@post-quantum.com> Tue, 22 August 2017 10:43 UTC

Return-Path: <CJT@post-quantum.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28284132955 for <ipsec@ietfa.amsl.com>; Tue, 22 Aug 2017 03:43:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t-9uikhzHAfm for <ipsec@ietfa.amsl.com>; Tue, 22 Aug 2017 03:43:01 -0700 (PDT)
Received: from relay.ezis.com (relay.ezis.com [5.153.73.19]) by ietfa.amsl.com (Postfix) with ESMTP id D74CF132951 for <ipsec@ietf.org>; Tue, 22 Aug 2017 03:43:00 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.41,411,1498518000"; d="scan'208";a="2267609"
Received: from unknown (HELO pqex01.post-quantum.com) ([192.168.142.3]) by ironport.ezis.com with ESMTP; 22 Aug 2017 11:43:00 +0100
Received: from PQEX02.post-quantum.com (192.168.142.18) by PQEX01.post-quantum.com (192.168.142.3) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Tue, 22 Aug 2017 11:42:59 +0100
Received: from PQEX02.post-quantum.com (192.168.142.18) by PQEX02.post-quantum.com (192.168.142.18) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Tue, 22 Aug 2017 11:42:58 +0100
Received: from PQEX02.post-quantum.com ([fe80::f470:9812:e4eb:5bd3]) by PQEX02.post-quantum.com ([fe80::f470:9812:e4eb:5bd3%13]) with mapi id 15.00.1320.000; Tue, 22 Aug 2017 11:42:58 +0100
From: Cen Jung Tjhai <CJT@post-quantum.com>
To: Valery Smyslov <svanru@gmail.com>, 'Tero Kivinen' <kivinen@iki.fi>
CC: "ipsec@ietf.org" <ipsec@ietf.org>
Thread-Topic: [IPsec] Proposed method to achieve quantum resistant IKEv2
Thread-Index: AQHTDE+mPH5PNqQgTkK9LOvm4SvL2qJ0GbUAgAekgoCAAKx1AIATrwqAgAA0fAA=
Date: Tue, 22 Aug 2017 10:42:58 +0000
Message-ID: <46593A80-1391-4849-9B57-D53EF08863FD@post-quantum.com>
References: <BBEB2C9C-9B96-4C6C-BB9B-4415F096FAE1@cisco.com> <041b01d30d21$8d33f230$a79bd690$@gmail.com> <22922.55551.190123.31763@fireball.acr.fi> <E8A3B50A-62D1-4211-B39F-932C9C959AF1@post-quantum.com> <006601d31b21$8d59ce20$a80d6a60$@gmail.com>
In-Reply-To: <006601d31b21$8d59ce20$a80d6a60$@gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.3.255.7]
Content-Type: text/plain; charset="utf-8"
Content-ID: <A79D9C1A9815B94C85BB998AFCC54E2B@post-quantum.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/evsu4pn6wCAzKsZMH4LUBNFuzQo>
Subject: Re: [IPsec] Proposed method to achieve quantum resistant IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Aug 2017 10:43:03 -0000

Hi

>> Well, that are valid reasons. However, what makes me uncomfortable is that this design 
>> looks like yet another short-term (or medium-term) solution. We already have 
>> draft-fluhrer-qr-ikev2 that was declared as a temporary short-term approach to countermeasure
>> immediate threat until cryptography science gives us new well-studied QC-proof primitives to
>> replace classic public key cryptography. Now it turns out that we don't have primitives we 
>> are certain in (at least for key exchange), so we decide to combine several different 
>> primitives (which we don't fully trust in) with classic DH. That's a valid approach for 
>> transition to PQ cryptography, but it doesn't look like long-term standard solution.

On our draft-00, one of the objectives is to deprecate DH key exchange in the long-term future. Hence, we thought it would be neater to introduce a new transform type and a new PQ key exchange payload (QSKE). The idea is that when people are happy to drop KE payloads, they can use QSKE payloads instead. Obviously, there are concerns with backward compatibility by introducing a new transform type, which I agree.

However, the issue with large payload size of post-quantum key exchange needs to be resolved regardless. Hence, the discussion has been focused on this since.

Is KE payload mandatory? One thing that we thought about is to use keep KE payload and exchange post-quantum blobs in this payload and use a bit of the reserved field to indicate that this is a large payload that potentially needs to be treated differently. In this way, there is no need use another KE payload but there could be issue with multiple KEs in IKE_SA_INIT when both classic and PQ KE primitive are used.

>> What particularly makes me unhappy:
>>    - the design looks like violation of the "gold rule" of cryptography - "don't combine 
>> several week primitives, it doesn't add to security, instead use one strong primitive" 
>> (I understand that each rule has exceptions, so that's probably the case, but still)

Before people are happy with PQ algorithms, it is acceptable to combine classic and PQ, as the security of IKE is not weaken. 

>>    - when (and if) workable QC appears, the classic DH exchange will provide zero security, 
>> but will still consume resources, that will just be wasted. And the proposed design doesn't 
>> allow to get rid of DH completely, so the resulting protocol will be inefficient. 
>>    
>>    So we end up with yet another temporary solution. That's not good.

I totally agree with you on inefficiency issue here, but having DH may not decrease security. It would be great to hear from the WG whether we should look into the needs in dropping DH at this stage.

Best regards,
CJ