Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

被引:177
|
作者
Bos, Joppe W. [1 ]
Costello, Craig [2 ]
Naehrig, Michael [2 ]
Stebila, Douglas [3 ]
机构
[1] NXP Semicond, Eindhoven, Netherlands
[2] Microsoft Res, Redmond, WA USA
[3] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
SECURITY; ALGORITHMS; ENCRYPTION;
D O I
10.1109/SP.2015.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing ciphersuites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem; we accompany these ciphersuites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE ciphersuites integrated into the OpenSSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
引用
收藏
页码:553 / 570
页数:18
相关论文
共 50 条
  • [1] Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem
    Li Z.
    Xie T.
    Zhang J.
    Xu R.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (12): : 2694 - 2701
  • [2] OpenSSLNTRU: Faster post-quantum TLS key exchange
    Bernstein, Daniel J.
    Brumley, Billy Bob
    Chen, Ming-Shing
    Tuveri, Nicola
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 845 - 862
  • [3] Post Quantum Password-Based Authentication Key Exchange Protocol Based on Ring Learning with Errors Problem
    Li Z.-C.
    Xie T.
    Zhang J.-M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (02): : 260 - 267
  • [4] A post-quantum key exchange protocol from the intersection of conics
    Alzati, Alberto
    Di Tullio, Daniele
    Gyawali, Manoj
    Tortora, Alfonso
    JOURNAL OF SYMBOLIC COMPUTATION, 2025, 126
  • [5] A post-quantum key exchange protocol from the intersection of quadric surfaces
    Daniele Di Tullio
    Manoj Gyawali
    The Journal of Supercomputing, 2023, 79 : 16529 - 16558
  • [6] A post-quantum key exchange protocol from the intersection of quadric surfaces
    Tullio, Daniele Di
    Gyawali, Manoj
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (15): : 16529 - 16558
  • [7] Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices
    Banerjee, Utsav
    Chandrakasan, Anantha P.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [9] Post-quantum key exchange Protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Dammika
    Anshel, Michael
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [10] Efficient module learning with errors-based post-quantum password-authenticated key exchange
    Ren, Peixin
    Gu, Xiaozhuo
    Wang, Ziliang
    IET INFORMATION SECURITY, 2023, 17 (01) : 3 - 17