Skip to main content

Liaison statement
LS on new work item for a Technical Report on: Overview of hybrid security approaches applicable to QKD networks

State Posted
Submitted Date 2021-09-28
From Group ITU-T-SG-17
From Contact Georges Sebek
To Group IETF
To Contacts The IETF Chair <>
Cc The IETF Chair <>
Scott Mansfield <>
The IESG <> <>
Response Contact
Purpose For action
Deadline 2021-11-19 Action Needed
Attachments SG17-LS310-att
ITU-T Study Group 17 is pleased to inform that we have established a new work
item (WI) TR.hybsec-qkdn for a Technical Report (TR) presenting overview of
hybrid security approaches applicable to QKD networks. The creation of this WI
was agreed in April 2021 and therefore is in a very early draft stage. However,
the baseline text of this TR makes references to and describes some of your WIs
as listed below (published and/or under progress). With this liaison statement,
we would like to give you the opportunity to review the description made of
your WIs and request that you send back to us any comments. Further, if you are
aware of any new work in progress related to this TR, please inform us about
the new WI(s).

Described ETSI TC CYBER QSC document:
[ETSI TS 103 744], Technical Specification TS 103 744 (2020), CYBER;
Quantum-safe Hybrid Key Exchanges (2020)

Described IETF documents:
[IETF RFC 8784], IETF Standard RFC8784 (2020), Mixing Preshared Keys in the
Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security.
[IETF RFC 7296], IETF Standard RFC7296 (2014), Internet Key Exchange Protocol
Version 2 (IKEv2). [IETF draft-ietf-ipsecme-ikev2-multiple-ke-03], IETF draft
standard draft-ietf-ipsecme-ikev2-multiple-ke-03 (2021), Multiple Key Exchanges
in IKEv2 draft-ietf-ipsecme-ikev2-multiple-ke-03. [IETF
draft-campagna-tls-bike-sike-hybrid-06], IETF draft experimental
draft-campagna-tls-bike-sike-hybrid-06, Hybrid Post-Quantum Key Encapsulation
Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). [IETF RFC 5246], IETF
Standard RFC5246 (2008), The Transport Layer Security (TLS) Protocol Version 1.2

Described BSI document:
[BSI TR-02102-1], BSI Technical Guideline TR-02102-1 (2021), Cryptographic
Mechanisms: Recommendations and Key Lengths

Note BSI: Bundesamt für Sicherheit in der Informationstechnik

Described NIST documents:
[NIST SP 800-56Ar3], NIST Special Publication 800-56A Revision 3(2018),
Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm
Cryptography. [NIST SP800-133r2], NIST Special Publication 800-133 Revision 2
(2020), Recommendation for Cryptographic Key Generation. [NIST SP800-56Cr2],
NIST Special Publication 800-56C Revision 2 (2020), Recommendation for
Key-Derivation Methods in Key-Establishment Schemes. Q15/17 is looking forward
to close cooperation with TC CYBER QSC, IETF (in particular, IETF Security
Area), BSI and NIST for future standardization on Quantum-based security.