Virtual Private Networks in the Quantum Era: A Security in Depth Approach

被引:1
|
作者
Schatz, David [1 ]
Altheide, Friedrich [1 ]
Koerfgen, Hedwig [2 ]
Rossberg, Michael [1 ]
Schaefer, Guenter [1 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
关键词
Virtual Private Networks; Internet Key Exchange; Quantum Key Distribution; Multipath Key Reinforcement;
D O I
10.5220/0012121800003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional asymmetric cryptography is threatened by the ongoing development of quantum computers. A mandatory countermeasure in the context of virtual private networks (VPNs) is to use post-quantum cryptography (PQC) as a drop-in replacement for the authenticated key exchange in the Internet Key Exchange (IKE) protocol. However, the results of the ongoing cryptanalysis of PQC cannot be predicted. Consequently, this article discusses orthogonal methods for quantum-resistant key exchanges, like quantum key distribution (QKD) and multipath key reinforcement (MKR). As each method has limitations when used on its own, we conclude that it is best to maximize security by combining all available sources of symmetric key material to protect traffic inside a VPN. As one possible realization, we propose a lightweight proxy concept that uses available symmetric keys, like QKD and MKR keys, to implement a transparent cryptographic tunnel for all IKE packets, and consequently for PQC key exchanges. In contrast to combining PQC and symmetric key material within the IKE protocol, our approach provides security in depth: If secure symmetric keys are available, attacks on IKE and hence on PQC algorithms are infeasible. But even otherwise, the security properties of IKE and thus PQC are not weakened, so the overall security of the VPN is guaranteed to increase.
引用
收藏
页码:486 / 494
页数:9
相关论文
共 50 条
  • [1] On virtual private networks security design issues
    Cheung, KH
    Misic, J
    COMPUTER NETWORKS, 2002, 38 (02) : 165 - 179
  • [2] Towards a New Approach for Adaptive Security Management in New Generation Virtual Private Networks
    Bahnasse, Ayoub
    Ezzahraa Louhab, Fatima
    Talea, Mohamed
    Ait Oulahyane, Hafsa
    Harbi, Adel
    Khiat, Azeddine
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 298 - 303
  • [3] Analysis of security threats to MPLS virtual private networks
    Grayson, Denise
    Guernsey, Daniel
    Butts, Jonathan
    Spainhower, Michael
    Shenoi, Sujeet
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 146 - 153
  • [4] Rethinking Virtual Private Networks in the Software-Defined Era
    Lospoto, Gabriele
    Rimondini, Massimo
    Vignoli, Benedetto Gabriele
    Di Battista, Giuseppe
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 379 - 387
  • [5] The Genetic Approach for Design of Virtual Private Networks
    Kotenko, Igor
    Saenko, Igor
    2015 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2015, : 168 - 175
  • [6] An active network approach to Virtual Private Networks
    Maresca, R
    D'Arienzo, M
    Esposito, M
    Romano, SP
    Ventre, G
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 502 - 507
  • [7] Off-the-shelf security creates virtual private networks
    Kempainen, S
    EDN, 1998, 43 (17) : 14 - 14
  • [8] A Novel Security Model for Cooperative Virtual Networks in the IoT Era
    Alabady, Salah A.
    Al-Turjman, Fadi
    Din, Sadia
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (02) : 280 - 295
  • [9] A Novel Security Model for Cooperative Virtual Networks in the IoT Era
    Salah A. Alabady
    Fadi Al-Turjman
    Sadia Din
    International Journal of Parallel Programming, 2020, 48 : 280 - 295
  • [10] Security for virtual private intranets
    Arbaugh, WA
    Davin, JR
    Farber, DJ
    Smith, JM
    COMPUTER, 1998, 31 (09) : 48 - +