Virtual Private Networks in the Quantum Era: A Security in Depth Approach

被引:1
|
作者
Schatz, David [1 ]
Altheide, Friedrich [1 ]
Koerfgen, Hedwig [2 ]
Rossberg, Michael [1 ]
Schaefer, Guenter [1 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
关键词
Virtual Private Networks; Internet Key Exchange; Quantum Key Distribution; Multipath Key Reinforcement;
D O I
10.5220/0012121800003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional asymmetric cryptography is threatened by the ongoing development of quantum computers. A mandatory countermeasure in the context of virtual private networks (VPNs) is to use post-quantum cryptography (PQC) as a drop-in replacement for the authenticated key exchange in the Internet Key Exchange (IKE) protocol. However, the results of the ongoing cryptanalysis of PQC cannot be predicted. Consequently, this article discusses orthogonal methods for quantum-resistant key exchanges, like quantum key distribution (QKD) and multipath key reinforcement (MKR). As each method has limitations when used on its own, we conclude that it is best to maximize security by combining all available sources of symmetric key material to protect traffic inside a VPN. As one possible realization, we propose a lightweight proxy concept that uses available symmetric keys, like QKD and MKR keys, to implement a transparent cryptographic tunnel for all IKE packets, and consequently for PQC key exchanges. In contrast to combining PQC and symmetric key material within the IKE protocol, our approach provides security in depth: If secure symmetric keys are available, attacks on IKE and hence on PQC algorithms are infeasible. But even otherwise, the security properties of IKE and thus PQC are not weakened, so the overall security of the VPN is guaranteed to increase.
引用
收藏
页码:486 / 494
页数:9
相关论文
共 50 条
  • [31] Security performance analysis and the parameters simulation of quantum virtual private network based on IPSec protocol
    Nie Min
    Tao Jin
    Yang Guang
    Sun Aijing
    Pei Changxing
    The Journal of China Universities of Posts and Telecommunications, 2018, 25 (05) : 1 - 11
  • [32] Building identity-based security associations for provider-provisioned virtual private networks
    Khaled Masmoudi
    Hossam Afifi
    Telecommunication Systems, 2008, 39 : 215 - 222
  • [33] Building identity-based security associations for provider-provisioned virtual private networks
    Masmoudi, Khaled
    Afifi, Hossam
    TELECOMMUNICATION SYSTEMS, 2008, 39 (3-4) : 215 - 222
  • [34] Building mini-grid environments with virtual private networks: A pragmatic approach
    Kauhaus, Christian
    Fey, Dietmar
    PAR ELEC 2006: INTERNATIONAL SYMPOSIUM ON PARALLEL COMPUTING IN ELECTRICAL ENGINEERING, PROCEEDINGS, 2006, : 111 - +
  • [35] New approach for configuring hierarchical virtual private networks using proxy gateways
    Ishibashi, H
    Okayama, K
    Yamai, N
    Abe, K
    Matsuura, T
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 772 - 782
  • [36] Virtual private networks - how they work
    Younglove, R
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (06): : 260 - 262
  • [37] Integrity for virtual private routed networks
    Bush, R
    Griffin, TG
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1467 - 1476
  • [38] Future of virtual private networks (VPN)
    Bajenesco, T.I.
    Technische Mitteilungen (Schweizerische Post-, Telephon- und Telegraphenbetriebe), 73 (07):
  • [39] New economical virtual private networks
    Ben-Ameur, W
    Kerivin, H
    COMMUNICATIONS OF THE ACM, 2003, 46 (06) : 69 - 73
  • [40] Virtual private networks simplify communications
    Bellm, M
    CONTROL ENGINEERING, 1998, 45 (06) : 50 - 50