[secdir] Secdir telechat review of draft-ietf-lamps-cms-mix-with-psk-06

Phillip Hallam-Baker via Datatracker <noreply@ietf.org> Tue, 20 August 2019 20:19 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 31EC5120086; Tue, 20 Aug 2019 13:19:20 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Phillip Hallam-Baker via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: spasm@ietf.org, draft-ietf-lamps-cms-mix-with-psk.all@ietf.org, ietf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.100.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Phillip Hallam-Baker <hallam@gmail.com>
Message-ID: <156633236010.354.17330616899278153955@ietfa.amsl.com>
Date: Tue, 20 Aug 2019 13:19:20 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/GEMi5lh3BcitDxSga3DOQSL9YpI>
Subject: [secdir] Secdir telechat review of draft-ietf-lamps-cms-mix-with-psk-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Aug 2019 20:19:20 -0000

Reviewer: Phillip Hallam-Baker
Review result: Ready

We need the capability, the text is readable and there is a formal proof. What
more could we ask for?

The document provides a mechanism for protecting encrypted data by constructing
a symmetric key from the combination of a key agreement value constructed in
the normal fashion and a shared secret. This construction provides protection
against quantum cryptanalysis.

Application of the scheme is outside the scope of the document and is likely to
be challenging as the scheme has to rely on the shared secret not being exposed
in any form vulnerable to quantum cryptanalysis.