{"id":572319,"date":"2019-08-06T16:00:38","date_gmt":"2019-08-06T23:00:38","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?post_type=msr-project&#038;p=572319"},"modified":"2020-03-27T16:29:44","modified_gmt":"2020-03-27T23:29:44","slug":"post-quantum-tls","status":"publish","type":"msr-project","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-tls\/","title":{"rendered":"Post-Quantum TLS"},"content":{"rendered":"<h2>The Transport Layer Security (TLS) protocol<\/h2>\n<p>The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the world. While TLS is secure against today\u2019s classical computers, the asymmetric cryptography in TLS is unfortunately vulnerable to future attacks from quantum computers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-590230 size-large aligncenter\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-1024x391.jpg\" alt=\"\" width=\"1024\" height=\"391\" srcset=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-1024x391.jpg 1024w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-300x115.jpg 300w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-768x293.jpg 768w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2.jpg 1243w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Both the RSA and Elliptic Curve Diffie-Hellman asymmetric algorithms which set up the TLS exchange will succumb to Shor&#8217;s algorithm on a sufficiently large quantum computer. While a quantum computer of that size and stability may be 5 to 15 years off, cryptographers from around the world are already working to identify new, quantum-safe algorithms.<\/p>\n<h2>Post-Quantum Cryptography TLS<\/h2>\n<p>Given the importance of TLS, preparing for the transition to post-quantum cryptography needs to start now.\u00a0 Asymmetric cryptography in TLS is vulnerable in two places:<\/p>\n<ul>\n<li>Key exchange: the server and client exchange cryptographic messages use asymmetric key exchange algorithms (such as RSA and ECDH) to derive a symmetric key. The symmetric key then encrypts the rest of the session. (As above, the symmetric key algorithms used in key exchange (e.g., AES) aren\u2019t as vulnerable to quantum computers so we simply need to increase their key length to secure against a quantum adversary.)<\/li>\n<li>Authentication: during this step, the server (and optionally the client) proves its identity using its certificate\u2019s public key, involving signature algorithms such as RSA or ECDSA.<\/li>\n<\/ul>\n<p>In the future, quantum-safe algorithms will replace the use of RSA, ECDH, and ECDSA.<\/p>\n<p>We recommend using these schemes in hybrid mode until the cryptographic community gains full confidence in the new post-quantum cryptography. In hybrid mode, both key exchanges and signatures are performed in parallel, generating both a classical exchange\/signature and a post-quantum one. The resulting messages\/signatures are combined, offering the security against both current and future attacks.<\/p>\n<h2>A PQ Crypto fork of OpenSSL<\/h2>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/openssl.org\/\">OpenSSL<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> is an open-source implementation of the Transport Layer Security (TLS) protocol. We are collaborating with the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/openquantumsafe.org\/\">Open Quantum Safe project<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> to integrate post-quantum cryptography into TLS 1.2 and 1.3.<\/p>\n<p>The Open Quantum Safe <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/open-quantum-safe\/openssl\">OpenSSL repository<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> contains a fork of OpenSSL 1.1.1 that adds quantum-resistant key exchange and signature algorithms using <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/open-quantum-safe\/liboqs\">liboqs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> for prototyping purposes. The library supports both hybrid and post-quantum key exchange and authentication. \u00a0The post-quantum key exchange algorithms <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/frodokem\/\">FrodoKEM<\/a> and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/sike\/\">SIKE<\/a>, and the signature algorithms <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/picnic\/\">Picnic<\/a> and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/qtesla\/\">qTESLA<\/a>, co-developed by Microsoft, are integrated into this project.<\/p>\n<p>These libraries are for prototyping, experimentation, and for evaluating quantum-resistant cryptography. Post-quantum cryptography is an active area of research, and the security of proposed quantum-resistant algorithms may rapidly change as research advances. Any specific PQ algorithm including those used here may prove be insecure.<\/p>\n<p>The PQ fork of OpenSSL can be obtained here: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/open-quantum-safe\/openssl\/tree\/OQS-OpenSSL_1_1_1-stable\">https:\/\/github.com\/open-quantum-safe\/openssl\/tree\/OQS-OpenSSL_1_1_1-stable<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<h2>More information<\/h2>\n<p>For more information on Microsoft&#8217;s work in Post-Quantum Cryptography, see our main project page: <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-cryptography\/\">https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-cryptography\/\u00a0<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Transport Layer Security (TLS) protocol The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the world. While TLS is secure against today\u2019s classical computers, the asymmetric cryptography in TLS is unfortunately vulnerable to future attacks [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-572319","msr-project","type-msr-project","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Karen Easterbrook","user_id":32510,"people_section":"Section name 1","alias":"keaster"},{"type":"user_nicename","display_name":"Christian Paquin","user_id":31473,"people_section":"Section name 1","alias":"cpaquin"}],"msr_research_lab":[199565],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":18,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572319\/revisions"}],"predecessor-version":[{"id":646512,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572319\/revisions\/646512"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=572319"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=572319"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=572319"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=572319"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=572319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}