LS on new work item for a Technical Report on: Overview of hybrid security approaches applicable to QKD networks
|From Contact||Georges Sebek|
|To Contacts||The IETF Chair|
|Cc||The IETF Chair
|Deadline||2021-11-19 Action Needed|
ITU-T Study Group 17 is pleased to inform that we have established a new work item (WI) TR.hybsec-qkdn for a Technical Report (TR) presenting overview of hybrid security approaches applicable to QKD networks. The creation of this WI was agreed in April 2021 and therefore is in a very early draft stage. However, the baseline text of this TR makes references to and describes some of your WIs as listed below (published and/or under progress). With this liaison statement, we would like to give you the opportunity to review the description made of your WIs and request that you send back to us any comments. Further, if you are aware of any new work in progress related to this TR, please inform us about the new WI(s). Described ETSI TC CYBER QSC document: [ETSI TS 103 744], Technical Specification TS 103 744 (2020), CYBER; Quantum-safe Hybrid Key Exchanges (2020) Described IETF documents: [IETF RFC 8784], IETF Standard RFC8784 (2020), Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. [IETF RFC 7296], IETF Standard RFC7296 (2014), Internet Key Exchange Protocol Version 2 (IKEv2). [IETF draft-ietf-ipsecme-ikev2-multiple-ke-03], IETF draft standard draft-ietf-ipsecme-ikev2-multiple-ke-03 (2021), Multiple Key Exchanges in IKEv2 draft-ietf-ipsecme-ikev2-multiple-ke-03. [IETF draft-campagna-tls-bike-sike-hybrid-06], IETF draft experimental draft-campagna-tls-bike-sike-hybrid-06, Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). [IETF RFC 5246], IETF Standard RFC5246 (2008), The Transport Layer Security (TLS) Protocol Version 1.2 Described BSI document: [BSI TR-02102-1], BSI Technical Guideline TR-02102-1 (2021), Cryptographic Mechanisms: Recommendations and Key Lengths Note BSI: Bundesamt für Sicherheit in der Informationstechnik Described NIST documents: [NIST SP 800-56Ar3], NIST Special Publication 800-56A Revision 3(2018), Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. [NIST SP800-133r2], NIST Special Publication 800-133 Revision 2 (2020), Recommendation for Cryptographic Key Generation. [NIST SP800-56Cr2], NIST Special Publication 800-56C Revision 2 (2020), Recommendation for Key-Derivation Methods in Key-Establishment Schemes. Q15/17 is looking forward to close cooperation with TC CYBER QSC, IETF (in particular, IETF Security Area), BSI and NIST for future standardization on Quantum-based security.