Cryptography in the Era of Quantum Computers

  • Importance of Cryptography

    • Protects private communication of individuals and organizations online.
    • Safeguards information during transactions (e.g., online purchases, cloud uploads, accessing email).
  • Research Focus

    • Addressing the potential threats posed by future quantum computers.
    • Acknowledgment of the advancements quantum computers could bring across various fields.
    • Need to update current cryptographic methods to ensure continued security.
  • Existing Cryptographic Methods

    • Public-Key Cryptography (also known as Asymmetric Cryptography)
    • Relies on:
      • Difficulty of factoring large integers.
      • Difficulty of calculating elliptic curve discrete logarithms.
    • These problems could be efficiently solved by sufficiently advanced quantum computers.
  • Development of Post-Quantum Cryptography (PQC)

    • Aim to create cryptosystems rooted in mathematical problems that are resistant to quantum computing.
    • The work is collaborative and open-source, involving partnerships with academia and industry partners.
    • Goals include developing robust, trusted, tested, and standardized PQC.
    • Initiatives started in 2014, with initial papers published in 2015.
  • Standardization Efforts

    • Submission of cryptographic proposals to NIST's Post-Quantum Project throughout various rounds.
    • Outcomes from round 3 of NIST included:
    • CRYSTALS-Kyber for public-key encryption and key establishment.
    • CRYSTALS-Dilithium, Falcon, SPHINCS+ for digital signatures.
    • ISO approvals for FrodoKEM and two additional algorithms to facilitate standardization.

Considerations in Post-Quantum Cryptography

  • Integration with Existing Protocols

    • New cryptosystems must interface with established internet protocols such as TLS (Transport Layer Security).
  • Key Concerns for New Cryptosystems:

    • Size of encryption keys and signatures:
    • Must consider how key sizes will impact performance and usability.
    • Time required for operations:
    • Time to encrypt, decrypt, sign messages, or verify signatures should be efficient.
    • Traffic considerations:
    • Volume of data transmitted during encryption, decryption, or signature verification should be minimal.
  • Need for Cryptanalysis

    • Rigorous testing to identify any exploitable weaknesses in new cryptosystems is required.
    • Development must occur transparently, allowing global scrutiny from cryptographers, organizations, and governments.
    • Urgency is emphasized due to the unknown timeline regarding when classical cryptography will become vulnerable.
    • Risks include potential threats where adversaries might store encrypted data and decrypt it once quantum machines are available.

Active Research and Development in PQC

  • Project Participation
    • Involvement in the Open Quantum Safe project aimed at enhancing post-quantum cryptography via various protocols and libraries.
    • Development of liboqs library and integrations with protocols such as OpenSSL (for TLS) and OpenSSH (for SSH).
    • Creation of a deprecated fork of OpenVPN to demonstrate how PQC can function within VPN tunnels (not currently maintained).

Specific Post-Quantum Cryptographic Algorithms:

  • FrodoKEM

    • Based on the Learning with Errors (LWE) problem, which utilizes principles of lattices for security.
  • SQISign

    • A compact post-quantum signature scheme utilizing isogeny graphs from supersingular elliptic curves.
    • Designated as a candidate within the NIST PQC Signature project.

NIST Post-Quantum Project Participation

  • Collaboration and Submissions

    • Engagement with global cryptographers to offer candidates for review and analysis through the NIST PQC initiative.
    • Development of four candidates focusing on quantum-resilience while maintaining compatibility with existing communication protocols:
    • Two candidates related to key exchange systems.
    • One candidate for digital signatures.
    • Additional contribution in support of a second signature system.
    • Each proposal featured unique strengths and weaknesses, grounded in different mathematical challenges and exhibiting varied performance and key size trade-offs.
    • The post-quantum cryptography domain is still developing; extensive cryptanalysis is vital for confirming security of proposals.
  • Historical Notes on Non-Active Algorithms

    • Reference to earlier submissions no longer in active development for researcher awareness.
Notable Algorithm Distress.
  • SIKE (Supersingular Isogeny Key Encapsulation)

    • Involved arithmetic operations on elliptic curves over finite fields for key exchange.
    • Noted for a catastrophic vulnerability discovered in summer 2022.
  • Picnic

    • A public-key digital signature algorithm employing zero-knowledge proof systems centered on symmetric key primitives.
  • qTESLA

    • A post-quantum signature model based on the Ring Learning With Errors (R-LWE) problem.

NIST NCCoE PQC Migration Project

  • Collaboration
    • Participation in the NIST Cybersecurity Center of Excellence (NCCoE) PQC Migration project.
    • Collaboration with industrial and government entities to:
    • Build detection tools for vulnerable algorithms.
    • Test the interoperability and performance of post-quantum protocols and applications.
    • Reports and updates are available on the NCCoE project page: Migration to Post-Quantum Cryptography | NCCoE.