<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ipsecme-ikev2-pqc-auth-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="PQC Authentication in IKEv2">Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-ikev2-pqc-auth-04"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Valery Smyslov">
      <organization>ELVIS-PLUS</organization>
      <address>
        <postal>
          <country>Russian Federation</country>
        </postal>
        <email>svan@elvis.ru</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="05"/>
    <area>Security</area>
    <workgroup>ipsecme</workgroup>
    <keyword>PQC</keyword>
    <keyword>IKEv2</keyword>
    <keyword>Digital Signature</keyword>
    <keyword>ML-DSA</keyword>
    <keyword>SLH-DSA</keyword>
    <abstract>
      <?line 77?>

<t>Signature-based authentication methods are utilized in IKEv2 <xref target="RFC7296"/>. The current version of the Internet Key Exchange Version 2 (IKEv2) protocol supports traditional digital signatures.</t>
      <t>This document specifies a generic mechanism for integrating post-quantum cryptographic (PQC) digital signature algorithms into the IKEv2 protocol. The approach allows for seamless inclusion of any PQC signature scheme within the existing authentication framework of IKEv2. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) and Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as authentication methods within the IKEv2 protocol, as they have been standardized by NIST.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-pqc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ipsecme Working Group mailing list (<eref target="mailto:ipsecme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsecme/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Key Exchange, or IKEv2 <xref target="RFC7296"/>, is a key agreement and security negotiation protocol; it is used for key establishment in IPsec. In the IKE_AUTH exchange, the initiator and responder independently select and use their preferred authentication method, which may differ between peers. The most common authentication method is digital signatures using asymmetric cryptography.  Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA.</t>
      <t>The existence of a Cryptographically Relevant Quantum Computer (CRQC) would render state-of-the-art traditional asymmetric algorithms obsolete and insecure. This is because the assumptions about the intractability of the mathematical problems these algorithms rely on, which offer confident levels of security today, no longer apply in the existence of a CRQC. Consequently, there is a requirement to update protocols and infrastructure to use post-quantum algorithms. Post-quantum algorithms are asymmetric algorithms designed to be secure against CRQCs as well as classical computers. The traditional cryptographic primitives that need to be replaced by PQC algorithms are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>.</t>
      <t>This document defines a general approach to incorporating PQC digital signature algorithms into IKEv2 while maintaining interoperability and backward compatibility. Additionally, it outlines how Module-Lattice-Based Digital Signatures (ML-DSA) <xref target="FIPS204"/> and Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> can be employed as authentication methods within IKEv2, as they have been standardized the US National Institute of Standards and Technology (NIST) PQC project.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms
into two classes:</t>
      <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
      <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
    </section>
    <section anchor="general-framework-for-pqc-authentication-in-ikev2">
      <name>General Framework for PQC Authentication in IKEv2</name>
      <t>IKEv2 authentication commonly relies on digital signatures to verify the identity of communicating peers. The mechanism described in this document enables the use of any PQC digital signature algorithm without modifying core IKEv2 operations.</t>
      <section anchor="specifying-pqc-signature-algorithms">
        <name>Specifying PQC Signature Algorithms</name>
        <ul spacing="normal">
          <li>
            <t>IKEv2 can use arbitrary signature algorithms as described in <xref target="RFC7427"/>, where the "Digital Signature" authentication method supersedes previously defined signature authentication methods. Any PQC digital signature algorithm can be incorporated using the "Signature Algorithm" field in authentication payloads, as defined in <xref target="RFC7427"/>.</t>
          </li>
          <li>
            <t>AlgorithmIdentifier ASN.1 objects will be used to uniquely identify PQC signature algorithm scheme and the parameter set associated with it.</t>
          </li>
        </ul>
      </section>
      <section anchor="sig">
        <name>Signature Generation and Verification</name>
        <t>PQC signatures may be generated in either deterministic or hedged modes. The terms deterministic and hedged  used in this document are in accordance with <xref target="FIPS204"/> and <xref target="FIPS205"/>, which define the ML-DSA and SLH-DSA algorithms. Future PQC signature algorithms may adopt different nomenclature, but will be expected to follow the same principles.</t>
        <t>In the deterministic mode, the signature is derived entirely from the message and the signer’s private key, without introducing fresh randomness at signing time. While this eliminates reliance on an external random number generator (RNG), it increases susceptibility to side-channel attacks, particularly fault injection attacks.</t>
        <t>The hedged mode provides some resistance against this risk by including precomputed randomness in the signer's private key and incorporating fresh randomness generated at signing time.
This foils some side channel attack approaches, while adding no additional strength against others.
If protection against side-channel attacks are required, an ML-DSA implementation that implements side-channel resistance should be used.</t>
        <t>In the context of signature-based authentication in IKEv2, the data used for generating a digital signature is unique for each session, as it includes session-specific information such as nonces, cryptographic parameters, and identifiers. PQC signature algorithms can leverage the hedged variant within IKEv2 to enhance security against side-channel attacks. The choice between deterministic and hedged signing modes does not impact interoperability because the verification process remains the same for both variants.</t>
        <t>If the PQC signature algorithm uses a 'context' input parameter, it <bcp14>MUST</bcp14> be set to an empty string.</t>
        <t>Certain digital signature algorithms support two modes: "pure" mode and "pre-hash" mode. For example, ML-DSA and
SLH-DSA support both modes. In pure mode, the content is signed directly along with some domain separation
information. In contrast, pre-hash mode involves signing a digest of the message. This document specifies the use
of pure mode for signature-based authentication in IKEv2, where the message is signed directly along with domain separation information. The data used for authentication in IKEv2, as described in Section 2.15 of <xref target="RFC7296"/>, consists of elements such as nonces, SPIs, and initial exchange messages (messages preceding IKE_AUTH), which are typically within device memory constraints. While pre-hash mode can help in scenarios with memory constraints, the IKEv2 authentication data is generally small, and combined with other practical challenges (discussed in <xref target="design"/>), this document only specifies pure mode.</t>
        <section anchor="handling-pqc-signatures-in-ikev2">
          <name>Handling PQC Signatures in IKEv2</name>
          <t>For integrating PQC signature algorithms into IKEv2, the approach used in <xref target="RFC8420"/> is followed.</t>
          <t>As specified in <xref target="RFC7427"/>, both the initiator and responder <bcp14>MUST</bcp14> send the SIGNATURE_HASH_ALGORITHMS notify payload in the IKE_SA_INIT exchange to indicate the set of hash algorithms they support for signature generation and verification. The SIGNATURE_HASH_ALGORITHMS notify payload contains a list of 2-octet hash algorithm identifiers, defined in the IANA "IKEv2 Hash Algorithms" registry.</t>
          <t>For PQC signature algorithms that inherently operate directly on the raw message without hashing, such as ML-DSA and SLH-DSA, only the 'Identity' hash function is applicable. The 'Identity' hash function (value 5) is defined in Section 2 of <xref target="RFC8420"/> and indicates that the input message is used as-is, without any hash function applied. Therefore, implementations supporting such PQC signature algorithms <bcp14>MUST</bcp14> include the 'Identity' hash (5) in the SIGNATURE_HASH_ALGORITHMS notify. Furthermore, PQC signature algorithms requiring the 'Identity' hash <bcp14>MUST NOT</bcp14> be used with a peer that has not indicated support for the Identity hash in its notify payload.</t>
          <t>For additional background on design alternatives that were considered and the rationale for adopting the <xref target="RFC8420"/> approach as the cleanest and most secure method, see <xref target="design"/>.</t>
          <t>When generating a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signer as the message to be signed (with empty context string, if applicable). The resulting signature is placed into the Signature Value field of the Authentication Payload.</t>
          <t>When verifying a signature with a PQC signature algorithm, the IKEv2 implementation takes the InitiatorSignedOctets string or the ResponderSignedOctets string (as appropriate), logically sends it to the identity hash (which leaves it unchanged), and then passes it into the PQC signature verifier as the message to be verified (with empty context string, if applicable).</t>
          <t>IKEv2 peers supporting the PQC authentication mechanism defined in this specification <bcp14>SHOULD</bcp14> implement IKEv2 message fragmentation as specified in <xref target="RFC7383"/>, unless IKEv2 runs over a reliable transport (e.g., <xref target="RFC9329"/>) or the underlying network is known to support sufficiently large MTUs without fragmentation issues, since PQC public keys and signatures can be significantly larger than those used in traditional algorithms. 
For example, ML-DSA-44 requires a public key of 1,312 bytes and a signature of 2,420 bytes, while even the smallest SLH-DSA signature is around 7,856 bytes. As guidance, IKEv2 peers should assume a minimum PMTU of 1280 bytes for IPv6 (per <xref target="RFC8200"/>) and, where legacy IPv4 networks are a consideration, an effective MTU of 576 bytes for IPv4 (per <xref target="RFC1122"/>).</t>
        </section>
      </section>
      <section anchor="mechanisms-for-signaling-supported-key-pair-types">
        <name>Mechanisms for Signaling Supported Key Pair Types</name>
        <t>The following mechanisms can be used by peers to signal the types of digital signature algorithms and parameters they support:</t>
        <ul spacing="normal">
          <li>
            <t>Certificate Request Payload: One method to ascertain that the key pair type the initiator wants the responder
to use is through a Certificate Request payload (defined in Section 3.7 of <xref target="RFC7296"/>) sent by the initiator. For example, the initiator can specify that it trusts certificates issued by a certificate authority (CA) that signs with a particular post-quantum cryptographic (PQC) signature algorithm. This implies that the initiator can process signatures generated using that algorithm, thereby allowing the responder to authenticate itself using a key pair associated with the specified PQC signature scheme.</t>
          </li>
          <li>
            <t>Authentication Method Announcement: Another method is to utilize <xref target="RFC9593"/>,   <br/>
which enables peers to declare their supported authentication methods. This improves interoperability when IKEv2 peers are configured with multiple credential types of different type to authenticate each other. The responder includes a SUPPORTED_AUTH_METHODS notification in the IKE_SA_INIT response message, listing the PQC signature scheme(s) it supports. The initiator includes the SUPPORTED_AUTH_METHODS notification in either the IKE_AUTH request message or in the IKE_INTERMEDIATE request. This notification lists the PQC digital signature scheme(s) supported by the initiator, ordered by preference.</t>
          </li>
        </ul>
        <t>In traditional IKEv2 deployments, peers often implicitly know the signature algorithms in use based on pre-configured certificates, trusted CAs, and IKEv2 policies. However, cryptographic agility, the ability to negotiate and use different cryptographic algorithms without requiring software or configuration updates is increasingly important for long-term security and interoperability. This requirement becomes even more relevant with the introduction of PQC algorithms, where multiple signature algorithms with varying security levels and performance characteristics may need to be supported over time.</t>
      </section>
    </section>
    <section anchor="ml-dsa">
      <name>Specifying ML-DSA within IKEv2</name>
      <t>ML-DSA <xref target="FIPS204"/> is a digital signature algorithm based on the hardness lattice problems over module lattices (i.e., the Module Learning with Errors problem (MLWE)). The design of the algorithm is based on the "Fiat-Shamir with Aborts" <xref target="Lyu09"/> framework introduced by Lyubashevsky that leverages rejection sampling to render lattice- based FS schemes compact and secure. ML-DSA uses a uniform distribution over small integers for computing coefficients in error vectors, which makes the scheme easier to implement.</t>
      <t>ML-DSA is instantiated with 3 parameter sets for the security categories 2, 3, and 5 (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). Security properties of ML-DSA are discussed in Section 9 of <xref target="I-D.ietf-lamps-dilithium-certificates"/>. This document specifies the use of the ML-DSA algorithm in IKEv2 at three security levels: ML-DSA-44, ML-DSA-65, and ML-DSA-87.</t>
    </section>
    <section anchor="slh-dsa">
      <name>Specifying SLH-DSA within IKEv2</name>
      <t>SLH-DSA <xref target="FIPS205"/> utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for security levels 1, 3, and 5 were chosen to provide AES-128, AES-192, and AES-256 bits of security respectively (see Table 2 in Section 10 of <xref target="I-D.ietf-pquip-pqc-engineers"/>). This document specifies the use of the SLH-DSA algorithm in IKEv2 at each level.</t>
      <t>Each security level (1, 3, and 5) defines two variants of the algorithm: a small (S) version and a fast (F) version. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained  IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version. For hash function selection, the algorithm uses SHA-256 (<xref target="FIPS180"/>) for security level 1 and both SHA-256 and SHA-512 (<xref target="FIPS180"/>) for security levels 3 and 5. Alternatively, SHAKE256 (<xref target="FIPS202"/>) can be used across all security levels.</t>
      <t>ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme in the face of a CRQC. While attacks on lattice-based schemes like ML-DSA are currently hypothetical at the time of writing this document, such attacks, if realized, could compromise their security. SLH-DSA would remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures.</t>
    </section>
    <section anchor="implementation-alternatives-for-ml-dsa">
      <name>Implementation Alternatives for ML-DSA</name>
      <t>With ML-DSA, there are two different approaches to implementing the signature process.
The first one is to simply hand the SignedOctets string to the cryptographic library to generate the full signature; this works for SLH-DSA as well.</t>
      <t>The second approach involves using the Externalμ-ML-DSA API defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. In this method, the implementation calls the Externalμ-ML-DSA.Prehash API with the SignedOctets string and the ML-DSA public key, generating a hash. This
hash is then passed to the cryptographic library to execute the Externalμ-ML-DSA.Sign API, which uses the hash and the ML-DSA private key to produce the signature.</t>
      <t>Both methods produce the same ML-DSA signature and are fully interoperable. The choice between them depends on implementation preferences, such as whether the pre-hashing step is handled internally by the cryptographic module or performed explicitly by the IKEv2 implementation.</t>
    </section>
    <section anchor="use-of-ml-dsa-and-slh-dsa">
      <name>Use of ML-DSA and SLH-DSA</name>
      <t>Both ML-DSA and SLH-DSA offer deterministic and hedged signing modes. By default, ML-DSA uses a hedged approach, where the random value rnd is a 256-bit string generated by an Random Bit Generator (RBG). The signature generation function utilizes this randomness along with the private key and the preprocessed message.
In the deterministic variant, rnd is instead set to a constant 256-bit zero string. Similarly, SLH-DSA can operate in either deterministic or hedged mode. The mode is determined by the value of opt_rand, when opt_rand is set to a fixed value (e.g., the public seed from the public key), SLH-DSA generates deterministic signatures, ensuring that signing the same message twice produces the same signature. In hedged mode, opt_rand is a fresh random value, introducing additional entropy to enhance security and mitigate potential side-channel risks.</t>
      <t>IKEv2 peers can use either the hedged or deterministic variants of ML-DSA and SLH-DSA for authentication in IKEv2, with a preference for using the hedged mode (<xref target="sig"/>).</t>
      <t>The three security levels of ML-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-dilithium-certificates"/>. <xref target="FIPS204"/> defines both a pure and a pre-hash variant of ML-DSA, but <xref target="I-D.ietf-lamps-dilithium-certificates"/> specifies only the pure variant.</t>
      <t>The different combinations of SLH-DSA are identified via AlgorithmIdentifier ASN.1 objects, as specified in <xref target="I-D.ietf-lamps-x509-slhdsa"/>. <xref target="FIPS205"/> defines two signature modes: pure mode and pre-hash mode. <xref target="I-D.ietf-lamps-x509-slhdsa"/> specifies the use of both Pure SLH-DSA and HashSLH-DSA in Public Key Infrastructure X.509 (PKIX) certificates and Certificate Revocation Lists (CRLs).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>PQC signature algorithms are modeled under strong unforgeability against an adaptive chosen message attack (SUF-CMA). Examples include ML-DSA and SLH-DSA, which adhere to this security model.</t>
      <t>Different PQC signature schemes are designed to provide security levels comparable to well-established cryptographic primitives. For example, some schemes align with the security of AES-128, AES-192, and AES-256, while others correspond to the security levels of SHA-256 or SHA3-256. The choice of a PQC signature algorithm should be guided by the desired security level and performance requirements.</t>
      <t>ML-DSA-44, ML-DSA-65, and ML-DSA-87 are designed to offer security comparable with the SHA-256/SHA3-256, AES-192, and AES-256 respectively. Similarly, SLH-DSA-128{S,F}-{SHA2,SHAKE}, SLH-DSA-192{S,F}-{SHA2,SHAKE}, and SLH-DSA-256{S,F}-{SHA2,SHAKE} are designed to offer security comparable with the AES-128, AES-192, and AES-256 respectively.</t>
      <t>The Security Considerations section of <xref target="I-D.ietf-lamps-dilithium-certificates"/> and <xref target="I-D.ietf-lamps-x509-slhdsa"/> apply to this specification as well.</t>
      <t>SLH-DSA keys are limited to 2^64 signatures. This upper bound is so large that even a IKEv2 server establishing IKEv2 sessions at an extremely high rate could not realistically reach it (at 10 billion signatures per second, it would still take over 58 years). The limit is therefore of theoretical interest only, but implementations may still track signature usage as a precautionary security measure.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stefaan De Cnodder, Loganaden Velvindron, Paul Wouters, Andreas Steffen, Dan Wing, Rebecca Guthrie and Daniel Van Geest for the discussion and comments.</t>
      <!-- Start of Appendices -->

</section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7383">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>This document describes a way to avoid IP fragmentation of large Internet Key Exchange Protocol version 2 (IKEv2) messages. This allows IKEv2 messages to traverse network devices that do not allow IP fragments to pass through.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7383"/>
          <seriesInfo name="DOI" value="10.17487/RFC7383"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS 204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Lyu09" target="https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf">
          <front>
            <title>V. Lyubashevsky, “Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures“, ASIACRYPT 2009</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8420">
          <front>
            <title>Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes the use of the Edwards-curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8420"/>
          <seriesInfo name="DOI" value="10.17487/RFC8420"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9329">
          <front>
            <title>TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>This document describes a method to transport Internet Key Exchange Protocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association (SA) establishment and Encapsulating Security Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.</t>
              <t>TCP encapsulation for IKE and IPsec was defined in RFC 8229. This document clarifies the specification for TCP encapsulation by including additional clarifications obtained during implementation and deployment of this method. This documents obsoletes RFC 8229.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9329"/>
          <seriesInfo name="DOI" value="10.17487/RFC9329"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
      </references>
    </references>
    <?line 250?>

<section anchor="design">
      <name>Discussion of ML-DSA and SLH-DSA and Prehashing</name>
      <t>This section discusses various approaches for integrating ML-DSA and SLH-DSA into IKEv2 other than those proposed above.</t>
      <t>The signature architecture within IKE was designed around RSA (and later extended to ECDSA).
In this architecture, the actual message (the SignedOctets) are first hashed (using a hash that the verifier has indicated support for), and then passed for the remaining part of the signature generation processing.
That is, it is designed for signature algorithms that first apply a hash function to the message and then perform processing on that hash. Neither ML-DSA nor SLH-DSA fits cleanly into this architecture.</t>
      <t>We see three ways to address this mismatch.</t>
      <t>The first consideration is that both ML-DSA and SLH-DSA provide prehashed parameter sets, which are designed to sign messages that have already been hashed by an external source. At first glance, this might seem like an ideal solution. However, several practical challenges arise:</t>
      <ol spacing="normal" type="1"><li>
          <t>The prehashed versions of ML-DSA and SLH-DSA appear to be rarely used, making it likely that support for them in cryptographic libraries is limited or unavailable.</t>
        </li>
        <li>
          <t>The public keys for the prehashed variants use different OIDs, which means that certificates for IKEv2 would differ from those used in other protocols. This not only complicates certificate management but also adds protocol complexity if a peer needs to support both pure and prehashed variants. Additionally, some certificate authorities (CAs) may not support issuing certificates for prehashed ML-DSA or SLH-DSA due to their limited adoption.</t>
        </li>
        <li>
          <t>Some users have explicitly indicated a preference not to use the prehashed parameter sets.</t>
        </li>
      </ol>
      <t>The second is to note that, while IKEv2 normally follows the 'hash and then sign' paradigm, it doesn't always.
EdDSA has a similar constraint on not working cleanly with the standard 'hash and then sign' paradigm, and so the existing <xref target="RFC8420"/> provides an alternative method, which ML-DSA would cleanly fit into.
We could certainly adopt this same strategy; our concern would be that it might be more difficult for IKEv2 implementors which do not already have support for EdDSA.</t>
      <t>The third way is what we can refer to as 'fake prehashing'; IKEv2 would generate the hash as specified by the pre-hash modes in <xref target="FIPS204"/> and <xref target="FIPS205"/>, but instead of running ML-DSA or SLH-DSA in prehash mode, the hash is signed as if it were the unhashed message, as is done in pure mode.
This is a violation of the spirit, if not the letter of FIPS 204, 205. 
However, it is secure (assuming the hash function is strong), and fits in cleanly with both the existing IKEv2 architecture, and what crypto libraries provide. 
Additionally, for SLH-DSA, this means that we're now dependent on collision resistance (while the rest of the SLH-DSA architecture was carefully designed not to be).</t>
      <t>After analysis, the IPSECME working group chose the approach in <xref target="RFC8420"/> as cryptographically most secure way to integrate PQC algorithms into IKEv2.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
