{"id":572325,"date":"2019-08-06T16:00:26","date_gmt":"2019-08-06T23:00:26","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?post_type=msr-project&#038;p=572325"},"modified":"2019-08-06T16:06:49","modified_gmt":"2019-08-06T23:06:49","slug":"post-quantum-ssh","status":"publish","type":"msr-project","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-ssh\/","title":{"rendered":"Post-Quantum SSH"},"content":{"rendered":"<h2>The Secure Shell (SSH) protocol<\/h2>\n<p>The Secure Shell (SSH) protocol is one of the most widely-used security protocols in use today; it protects the information exchanged between clients and servers. SSH is secure against today\u2019s classical computers, however as its security relies in part on asymmetric cryptography, SSH is unfortunately vulnerable to attacks in the future from quantum computers<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-590230 size-large aligncenter\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-1024x391.jpg\" alt=\"\" width=\"1024\" height=\"391\" srcset=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-1024x391.jpg 1024w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-300x115.jpg 300w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2-768x293.jpg 768w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2020\/03\/symmetric_asymmetric-crypto-diagramv2.jpg 1243w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Both the RSA and Elliptic Curve Diffie-Hellman asymmetric algorithms which set up the SSH exchange will succumb to the Shor quantum algorithm on a sufficiently large quantum computer. While a quantum computer of that size and stability may be 5 to 15 years off, cryptographers from around the world are working to identify new, quantum-safe algorithms now.<\/p>\n<h2>Post-Quantum Cryptography SSH<\/h2>\n<p>Given the importance of SSH, the early planning for the transition to post-quantum cryptography needs to start soon.\u00a0 Asymmetric cryptography in SSH needs to be migrated in two places:<\/p>\n<ul>\n<li>Key exchange: during this step, the server and client exchange cryptographic messages using asymmetric key exchange algorithms (such as RSA and ECDH) that will be used to derive a symmetric key. That symmetric key will be used to encrypt the rest of the session. Those asymmetric key exchange algorithms will need to be replaced with quantum-safe algorithms. As described above, the symmetric key algorithms used in key exchange (e.g., AES) aren\u2019t as vulnerable to quantum computers so we simply need to increase the key length to secure the symmetric cryptography against a quantum adversary.<\/li>\n<li>Authentication: during this step, the server (and optionally the client) proves its identity using its public key. The signature algorithms (such as RSA or ECDSA) are not quantum safe and must be updated.<\/li>\n<\/ul>\n<p>Until we gain full confidence in the new post-quantum cryptographic schemes, it is recommended to use them in what we call hybrid mode. To achieve this, both key exchanges and signatures are performed in parallel, generating both a classical exchange\/signature and a post-quantum one. The resulting messages\/signatures are combined, offering the security against quantum attacks, while maintaining the security of today\u2019s schemes.<\/p>\n<h2>A fork of OpenSSH<\/h2>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/openssh.org\/\">OpenSSH<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> is an open-source implementation of the Secure Shell (SSH) protocol. The Open Quantum Safe <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/open-quantum-safe\/openssh-portable\">OpenSSH repository<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> contains a fork of OpenSSH 7.7 that adds quantum-resistant key exchange and signature algorithms using <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/open-quantum-safe\/liboqs\">liboqs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> for prototyping purposes. The post-quantum key exchange algorithms <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/frodokem\/\">FrodoKEM<\/a> and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/sike\/\">SIKE<\/a>, and the signature algorithms <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/picnic\/\">Picnic<\/a> and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/qtesla\/\">qTESLA<\/a>, co-developed by Microsoft, have been integrated into this project.<\/p>\n<p>liboqs and this integration into OpenSSH are designed for prototyping and evaluating quantum-resistant cryptography. The security of proposed quantum-resistant algorithms may rapidly change as research advances, and any specific PQ algorithm may ultimately prove be completely insecure against either classical or quantum computers.<\/p>\n<h2>More information<\/h2>\n<p>For more information on Microsoft&#8217;s work in Post-Quantum Cryptography, see our main project page: <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-cryptography\/\">https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/post-quantum-cryptography\/\u00a0<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Secure Shell (SSH) protocol The Secure Shell (SSH) protocol is one of the most widely-used security protocols in use today; it protects the information exchanged between clients and servers. SSH is secure against today\u2019s classical computers, however as its security relies in part on asymmetric cryptography, SSH is unfortunately vulnerable to attacks in the [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-572325","msr-project","type-msr-project","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Karen Easterbrook","user_id":32510,"people_section":"Section name 1","alias":"keaster"},{"type":"user_nicename","display_name":"Christian Paquin","user_id":31473,"people_section":"Section name 1","alias":"cpaquin"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":5,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572325\/revisions"}],"predecessor-version":[{"id":602274,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/572325\/revisions\/602274"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=572325"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=572325"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=572325"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=572325"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=572325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}