Hi Valery, >> Q1: >> >> The Security Considerations lists IKEv2/IPSec algorithms that are not >> considered quantum-resistant. However, that is not mentioned anywhere else. I >> think it would be good to mention that in the Abstract and/or Introduction. > > Introduction already contains the following text: > > If the preshared key has > sufficient entropy and the PRF, encryption and authentication > transforms are quantum-secure, then the resulting system is believed > to be quantum resistant, that is, invulnerable to an attacker with a > quantum computer. > > We think that it is out of scope of this document to classify existing > algorithms on the ground of whether they are quantum secure or not, > the Security Considerations section lists only most obvious cases. I was thinking of just adding (to the text you referenced above) something like: "The Security Considerations gives some examples of algorithms that are not considered quantum-resistant." But, if you don't think it is needed, I am fine with that. It was only a minor issue, so :) Regards, Christer -- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call