“…In the field of key exchange, alternative approaches are available, such as quantum key distribution (Alvaro et al, 2022;Ntanos et al, 2023), but currently, the software transition is a priority (for Information Security (Federal Office for Information Security, 2022). Particularly in the establishment of security parameters for tunneling a connection (e.g., IKEv2 on IPsec, one of the most powerful enabler protocols for building secure architectures), there exist successful proposals for implementing PQC (Pazienza et al, 2022).…”