<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-ipsecme-ikev2-hybrid-reliable-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQ/T hybrid composite KE for IKEv2">PQ/T Hybrid Composite Key Exchange and Reliable Transport for IKEv2</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-ipsecme-ikev2-hybrid-reliable-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <date year="2026" month="January" day="03"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 51?>

<t>The eventual transition to post-quantum key exchange will require elimination of traditional key exchange for
reduced protocol complexity and efficiency.  IKEv2 therefore requires a mechanism that can operate in a PQC-only environment, without depending on traditional key exchange algorithms (e.g., MODP DH or ECDH). As IKEv2 permits arbitrary combinations of algorithms, unnecessary complexity and insecure hybrid constructions are easily implemented.</t>
      <t>This document defines PQ/T hybrid composite key exchange algorithms for IKEv2 and a single combined KE payload that carries both the traditional and post-quantum components. It also leverages the existing IKEv2 reliable
transport mechanism so that large PQC key exchange messages can be reliably exchanged over TCP. Together, these mechanisms enable secure and efficient PQ/T hybrid deployments today and provide a clear path for IKEv2 to operate in environments where traditional algorithms have been replaced by PQC algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-hybrid-reliable/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange version 2 (<xref target="IKEv2"/>) is a key agreement and security negotiation protocol used for IPsec key establishment. The emergence of CRQCs will render traditional key exchange algorithms obsolete. In a post-quantum future, many systems will be unable to rely on or even ship traditional key exchange algorithms. For IKEv2 to remain deployable in such an environment, it must support PQC-only key exchange without depending on traditional key exchange algorithms.</t>
      <t>However, because IKEv2 requires that its first key exchange occur in the IKE_SA_INIT exchange, any PQC KEM public key or ciphertext that does not fit within a single IKE_SA_INIT message (without IP fragmentation) cannot be sent directly in that exchange. When a PQC KEM does not fit in IKE_SA_INIT, the initial exchange must fall back to a traditional key exchange before any PQC public key or ciphertext can be sent. This creates an important limitation: even in a future where CRQCs exist and PQC algorithms are mandatory, IKEv2 peers are forced to use a traditional key exchange in IKE_SA_INIT whenever the PQC KEM exceeds the path MTU. In deployments that do not implement traditional key exchange algorithms, such fallback is unacceptable. Absent reliable transport, PQC-only operation is therefore impossible when PQC key exchange payloads exceed the path MTU. PQC-only deployments remain impossible for any PQC scheme whose keying material does not fit inside an unfragmented IKE_SA_INIT message, prolonging reliance on traditional key exchange algorithms far beyond their acceptable security horizon. While functional, these mechanisms increase round-trip latency and add protocol complexity.</t>
      <t>Recent guidance, including that discussed in <xref section="13.3.2" sectionFormat="of" target="I-D.ietf-pquip-pqc-engineers"/>, notes that protocol designs benefit from allowing a small number of known good configurations that make sense, instead of allowing arbitrary combinations of individual configuration choices that may interact in dangerous ways. Allowing arbitrary combinations of traditional and PQC algorithms can lead to interactions that have not been thoroughly evaluated.  However, IKEv2 does not currently follow this guidance as <xref target="I-D.ietf-ipsecme-ikev2-mlkem"/> allows arbitrary combinations of DH groups and ML-KEM parameters through separate traditional and PQC negotiation paths, which may lead to untested or undesirable hybrid constructions and makes it difficult to enforce secure algorithm pairing.</t>
      <t>To address these issues, this document introduces:</t>
      <ul spacing="normal">
        <li>
          <t>PQ/T hybrid composite key exchange algorithms for IKEv2, representing single, fixed, known good combinations of traditional and PQC KEM algorithms.</t>
        </li>
        <li>
          <t>A combined KE payload format that carries both traditional and PQC components within a single payload.</t>
        </li>
        <li>
          <t>Leverages the IKEv2 reliable transport mechanism defined in <xref target="I-D.ietf-ipsecme-ikev2-reliable-transport"/> so that IKEv2 peers can use TCP for large PQC key exchange messages.</t>
        </li>
      </ul>
      <t>These updates remove the dependency on multi-round negotiation exchanges, eliminate the requirement to use traditional algorithms solely due to MTU limitations, reduce the risks associated with IP fragmentation of large PQC payloads, and provide a clear path for IKEv2 to operate securely and efficiently in a future where only PQC algorithms remain usable.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="RFC9794"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into three classes:</t>
      <t>"Traditional asymmetric cryptographic algorithm": An asymmetric cryptographic algorithm based on integer
factorisation, finite field discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-quantum asymmetric cryptographic algorithm": An asymmetric cryptographic algorithm that is intended to be
secure against attacks using quantum computers as well as classical computers.</t>
      <t>"Post-Quantum Traditional (PQ/T) hybrid scheme": A multi-algorithm scheme where at least one component algorithm is a post-quantum algorithm and at least one is a traditional algorithm.</t>
    </section>
    <section anchor="reliable-transport-requirements">
      <name>Reliable Transport Requirements</name>
      <t>PQC-only deployments (i.e., deployments that do not implement any traditional key exchange algorithms) cannot rely on UDP for IKE_SA_INIT when the PQC key exchange payload exceeds the path MTU. In these deployments, fallback to UDP would prevent the use of a PQC-only key exchange. Therefore, when a PQC-only key exchange method is offered or negotiated and the PQC key exchange payload exceeds the path MTU, the initiator <bcp14>MUST</bcp14> start IKE_SA_INIT over TCP, and peers <bcp14>MUST NOT</bcp14> fall back to UDP for IKE_SA_INIT. This requirement follows from the reliable transport mechanism defined in <xref target="I-D.ietf-ipsecme-ikev2-reliable-transport"/>.</t>
      <t>PQ/T hybrid composite key exchange produces a combined KE payload that may or may not exceed the path MTU, depending on the specific algorithm combination. When the combined KE payload exceeds the path MTU, the PQ/T hybrid composite key exchange <bcp14>MUST NOT</bcp14> be sent over UDP. If TCP is supported, the initiator <bcp14>MAY</bcp14> migrate to TCP and use the PQ/T hybrid composite key exchange; otherwise, the initiator <bcp14>MUST</bcp14> use a PQ/T hybrid non-composite key exchange.</t>
    </section>
    <section anchor="pqt-hybrid-composite-key-exchange-algorithms">
      <name>PQ/T hybrid composite Key Exchange Algorithms</name>
      <t>This document defines PQ/T hybrid composite key-exchange methods that <bcp14>MUST</bcp14> be treated as single, atomic key-exchange identifier. Because IKEv2 treats key-exchange methods (Transform Type 4) as opaque and does not define their internal processing (see <xref section="2.14" sectionFormat="of" target="IKEv2"/>), each hybrid method specifies how its traditional and PQC shared secrets are combined.</t>
      <t>Each PQ/T hybrid composite key exchange algorithm implies:</t>
      <ul spacing="normal">
        <li>
          <t>One traditional key exchange component</t>
        </li>
        <li>
          <t>One PQC KEM component</t>
        </li>
        <li>
          <t>One combined KE payload format</t>
        </li>
        <li>
          <t>A PQ/T hybrid key-exchange algorithm specific combiner (see <xref target="combiner"/>)</t>
        </li>
      </ul>
      <t>This document defines the following PQ/T hybrid composite key exchange algorithms:</t>
      <ul spacing="normal">
        <li>
          <t>ecp256-mlkem768</t>
        </li>
        <li>
          <t>ecp384-mlkem1024</t>
        </li>
        <li>
          <t>curve25519-mlkem768</t>
        </li>
      </ul>
      <t>Each PQ/T hybrid composite key exchange algorithm is represented as a single Transform ID of type 4 (Key Exchange Method) and is negotiated as a whole.</t>
    </section>
    <section anchor="combined-key-exchange-payload">
      <name>Combined Key Exchange Payload</name>
      <t>The KE payload carries both components of the
PQ/T hybrid composite key exchange algorithm. Specifically, the initiator includes its
traditional key exchange public key together with its PQC KEM public key:</t>
      <artwork><![CDATA[
  KEi = Traditional-Key-Exchange-Public-Key || PQC-KEM-Public-Key
]]></artwork>
      <t>The responder returns its traditional key exchange public key along with the
PQC ciphertext:</t>
      <artwork><![CDATA[
  KEr = Traditional-Key-Exchange-Public-Key || PQC-Ciphertext
]]></artwork>
      <t>Because both the traditional and post-quantum key exchange values are conveyed
within a single exchange, no ADDKE transforms are negotiated. Thus, the IKE_INTERMEDIATE
and IKE_FOLLOWUP_KE exchanges are not needed for the purpose of key exchange, but peers can negotiate
and use IKE_INTERMEDIATE for other purposes.</t>
      <t>The lengths of the traditional and PQC components are fixed and defined by the selected PQ/T hybrid composite Transform ID. No additional length fields are included in the KE payload.</t>
    </section>
    <section anchor="reliable-transport-negotiation">
      <name>Reliable Transport Negotiation</name>
      <t>PQ/T hybrid composite key exchange requires a reliable transport to avoid IP-layer fragmentation of large PQC key exchange values. Transport selection follows <xref target="I-D.ietf-ipsecme-ikev2-reliable-transport"/>. The initiator <bcp14>MUST</bcp14> follow the rules in the scenarios below.</t>
      <section anchor="separatetransports-negotiated">
        <name>SEPARATE_TRANSPORTS Negotiated</name>
        <t>If the initiator starts the IKE_SA_INIT exchange over TCP and includes a SEPARATE_TRANSPORTS Notify, and the responder also includes a SEPARATE_TRANSPORTS Notify, then the IKE SA is established using separate transports. In this configuration, all IKE messages are sent over TCP. ESP is sent over UDP (or directly over IP) if possible; if both UDP and IP are blocked, ESP is sent over TCP as described in <xref target="RFC9329"/>.</t>
      </section>
      <section anchor="no-separatetransports">
        <name>No SEPARATE_TRANSPORTS</name>
        <t>If the initiator starts the IKE_SA_INIT exchange over TCP and the responder accepts the TCP transport but does not include a SEPARATE_TRANSPORTS Notify, then the IKE SA operates in the mode defined by <xref target="RFC9329"/>. In this configuration, both IKE messages and ESP traffic are carried over the same TCP connection. PQ/T hybrid key exchange payloads can be sent in this configuration since the IKE messages are transported reliably.</t>
      </section>
    </section>
    <section anchor="combiner">
      <name>Hybrid Derivation</name>
      <t>Each PQ/T hybrid key exchange method defined in this document produces two independent shared secrets: one from the traditional component (K_T) and one from the PQC component (K_PQ). Because IKEv2 treats key exchange methods as opaque, the function that combines these secrets is defined per hybrid KE method. The PQ/T hybrid key exchange methods in this document use the Universal Combiner defined in <xref target="I-D.irtf-cfrg-hybrid-kems"/>. Note that in all PQ/T hybrid composite KE algorithms defined in this document, the PQC component is listed second in the algorithm name but is passed first to the Universal Combiner.</t>
      <t>Let:</t>
      <ul spacing="normal">
        <li>
          <t>K_T = traditional ECDH shared secret</t>
        </li>
        <li>
          <t>K_PQ = post-quantum shared secret</t>
        </li>
      </ul>
      <t>The combined secret is computed as:</t>
      <artwork><![CDATA[
  label      = "IKEv2-HYBRID-KE-v1"
  K_combined = UniversalCombiner(K_PQ, K_T, CT_PQ, "", PK_PQ,
               PK_T, label)
]]></artwork>
      <t>Where:</t>
      <ul spacing="normal">
        <li>
          <t>K_PQ : PQC shared secret</t>
        </li>
        <li>
          <t>K_T : traditional shared secret</t>
        </li>
        <li>
          <t>CT_PQ : PQC ciphertext</t>
        </li>
        <li>
          <t>PK_PQ : PQC public key</t>
        </li>
        <li>
          <t>PK_T : traditional public key</t>
        </li>
        <li>
          <t>label : protocol-specific domain separation string</t>
        </li>
      </ul>
      <t>The traditional component does not produce a ciphertext; therefore, the ciphertext argument corresponding to the traditional component is the empty string.</t>
      <t>The SKEYSEED value is computed as:</t>
      <sourcecode type="abnf"><![CDATA[
  SKEYSEED = prf(Ni | Nr, K_combined)
]]></sourcecode>
      <t>This replaces the g^ir shared secret defined in <xref target="IKEv2"/>; all other aspects of SKEYSEED computation remain unchanged.</t>
      <t>Once SKEYSEED is derived, the remainder of the IKEv2 key hierarchy is computed exactly as specified in <xref target="IKEv2"/>.</t>
      <t>This construction aligns with the hybrid key exchange approach used in TLS <xref target="I-D.ietf-tls-hybrid-design"/>,
where traditional and post-quantum secrets are concatenated before key derivation to ensure security
against both traditional and quantum adversaries.</t>
    </section>
    <section anchor="example-message-flow">
      <name>Example Message Flow</name>
      <t>This section illustrates an IKEv2 exchange using a PQ/T hybrid composite key
exchange algorithm. The initiator sends a combined KE payload containing
both the traditional DH public key and the PQC public key. The responder
returns its DH public key together with the PQC ciphertext.</t>
      <t>The exchange is shown using TCP, negotiated using the IKEv2 reliable transport mechanism.
Both peers include the SEPARATE_TRANSPORTS Notify to indicate support for
separate IKE and ESP transports.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="384" width="576" viewBox="0 0 576 384" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 552,48" fill="none" stroke="black"/>
            <path d="M 328,144 L 352,144" fill="none" stroke="black"/>
            <path d="M 320,176 L 344,176" fill="none" stroke="black"/>
            <path d="M 328,272 L 352,272" fill="none" stroke="black"/>
            <path d="M 320,304 L 344,304" fill="none" stroke="black"/>
            <path d="M 8,368 L 552,368" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="360,272 348,266.4 348,277.6" fill="black" transform="rotate(0,352,272)"/>
            <polygon class="arrowhead" points="360,144 348,138.4 348,149.6" fill="black" transform="rotate(0,352,144)"/>
            <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(180,320,304)"/>
            <polygon class="arrowhead" points="328,176 316,170.4 316,181.6" fill="black" transform="rotate(180,320,176)"/>
            <g class="text">
              <text x="40" y="36">Initiator</text>
              <text x="520" y="36">Responder</text>
              <text x="64" y="84">IKE_SA_INIT</text>
              <text x="136" y="84">(over</text>
              <text x="180" y="84">TCP)</text>
              <text x="36" y="100">HDR,</text>
              <text x="80" y="100">SAi1,</text>
              <text x="112" y="116">N(SEPARATE_TRANSPORTS),</text>
              <text x="36" y="132">KEi(</text>
              <text x="92" y="132">DH_pub_i</text>
              <text x="140" y="132">||</text>
              <text x="192" y="132">PQC_pub_i</text>
              <text x="244" y="132">),</text>
              <text x="28" y="148">Ni</text>
              <text x="380" y="180">HDR,</text>
              <text x="424" y="180">SAr1,</text>
              <text x="456" y="196">N(SEPARATE_TRANSPORTS),</text>
              <text x="380" y="212">KEr(</text>
              <text x="436" y="212">DH_pub_r</text>
              <text x="484" y="212">||</text>
              <text x="524" y="212">PQC_ct</text>
              <text x="564" y="212">),</text>
              <text x="372" y="228">Nr</text>
              <text x="52" y="260">IKE_AUTH</text>
              <text x="36" y="276">HDR,</text>
              <text x="68" y="276">SK</text>
              <text x="88" y="276">{</text>
              <text x="116" y="276">IDi,</text>
              <text x="160" y="276">AUTH,</text>
              <text x="208" y="276">SAi2,</text>
              <text x="252" y="276">TSi,</text>
              <text x="288" y="276">TSr</text>
              <text x="312" y="276">}</text>
              <text x="380" y="308">HDR,</text>
              <text x="412" y="308">SK</text>
              <text x="432" y="308">{</text>
              <text x="460" y="308">IDr,</text>
              <text x="504" y="308">AUTH,</text>
              <text x="552" y="308">SAr2,</text>
              <text x="380" y="324">TSi,</text>
              <text x="416" y="324">TSr</text>
              <text x="440" y="324">}</text>
              <text x="24" y="356">Child</text>
              <text x="60" y="356">SA</text>
              <text x="124" y="356">established;</text>
              <text x="192" y="356">ESP</text>
              <text x="240" y="356">traffic</text>
              <text x="292" y="356">uses</text>
              <text x="332" y="356">UDP.</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
Initiator                                                   Responder
---------------------------------------------------------------------

  IKE_SA_INIT (over TCP)
  HDR, SAi1,
  N(SEPARATE_TRANSPORTS),
  KEi( DH_pub_i || PQC_pub_i ),
  Ni                                    --->

                                       <---  HDR, SAr1,
                                             N(SEPARATE_TRANSPORTS),
                                             KEr( DH_pub_r || PQC_ct ),
                                             Nr

  IKE_AUTH
  HDR, SK { IDi, AUTH, SAi2, TSi, TSr } --->

                                       <---  HDR, SK { IDr, AUTH, SAr2,
                                             TSi, TSr }

Child SA established; ESP traffic uses UDP.
---------------------------------------------------------------------
]]></artwork>
      </artset>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQ/T hybrid composite key exchange algorithms reduce the risk of insecure or unintended algorithm combinations by ensuring that only well-defined, vetted pairs of traditional and PQC algorithms are used. This prevents deployments from constructing ad-hoc hybrids that may provide weaker security than either component alone.</t>
      <t>As in standard IKEv2, the KE payload (including both the traditional and PQC components) is integrity-protected and authenticated during the IKE_AUTH exchange. This protection prevents modification of either component by an active attacker.</t>
      <t>This document leverages the IKEv2 reliable transport mechanism to avoid IP-layer fragmentation of large PQC payloads. Finally, by enabling a PQC-only key exchange within IKE_SA_INIT and by avoiding fallback to traditional key exchange due solely to MTU constraints, the mechanisms in this document ensure that IKEv2 remains secure and deployable even in environments where traditional algorithms have been deprecated or removed due to their vulnerability to quantum-capable adversaries.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign three new values for the PQ/T hybrid composite key exchange
algorithm names "ecp256-mlkem768", "ecp384-mlkem1024", and
"curve25519-mlkem768" in the IKEv2 "Transform Type 4 Key Exchange Method
Transform IDs" registry and list this document as the reference.</t>
      <artwork><![CDATA[
   +========+======================+===========+
   | Number | Name                 | Reference |
   +========+======================+===========+
   |  TBD1  | ecp256-mlkem768      |[this RFC] |
   +--------+----------------------+-----------+
   |  TBD2  | ecp384-mlkem1024     |[this RFC] |
   +--------+----------------------+-----------+
   |  TBD3  | curve25519-mlkem768  |[this RFC] |
   +--------+----------------------+-----------+
]]></artwork>
      <artwork><![CDATA[
   Table 1: Updates to the IANA "Transform Type 4 - Key Exchange Method Transform IDs" registry
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank Dan Wing for his contributions to this specification.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="IKEv2">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-mlkem">
          <front>
            <title>Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Amazon Web Services</organization>
            </author>
            <date day="29" month="September" year="2025"/>
            <abstract>
              <t>   NIST recently standardized ML-KEM, a new key encapsulation mechanism,
   which can be used for quantum-resistant key establishment.  This
   draft specifies how to use ML-KEM by itself or as an additional key
   exchange in IKEv2 along with a traditional key exchange.  These
   options allow for negotiating IKE and Child SA keys which are safe
   against cryptographically relevant quantum computers and theoretical
   weaknesses in ML-KEM or implementation issues.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-mlkem-03"/>
        </reference>
        <reference anchor="I-D.ietf-ipsecme-ikev2-reliable-transport">
          <front>
            <title>Separate Transports for IKE and ESP</title>
            <author fullname="Valery Smyslov" initials="V." surname="Smyslov">
              <organization>ELVIS-PLUS</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="6" month="October" year="2025"/>
            <abstract>
              <t>   The Internet Key Exchange protocol version 2 (IKEv2) can operate
   either over unreliable (UDP) transport or over reliable (TCP)
   transport.  If TCP is used, then IPsec tunnels created by IKEv2 also
   use TCP.  This document specifies how to decouple IKEv2 and IPsec
   transports so that IKEv2 can operate over TCP, while IPsec tunnels
   use unreliable transport.  This feature allows IKEv2 to effectively
   exchange large blobs of data (e.g., when post-quantum algorithms are
   employed) while avoiding performance problems that arise when IPsec
   uses TCP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-reliable-transport-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
