Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

被引:177
|
作者
Bos, Joppe W. [1 ]
Costello, Craig [2 ]
Naehrig, Michael [2 ]
Stebila, Douglas [3 ]
机构
[1] NXP Semicond, Eindhoven, Netherlands
[2] Microsoft Res, Redmond, WA USA
[3] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
SECURITY; ALGORITHMS; ENCRYPTION;
D O I
10.1109/SP.2015.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing ciphersuites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem; we accompany these ciphersuites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE ciphersuites integrated into the OpenSSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
引用
收藏
页码:553 / 570
页数:18
相关论文
共 50 条
  • [31] Speeding up R-LWE Post-quantum Key Exchange
    Gueron, Shay
    Schlieker, Fabian
    SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 187 - 198
  • [32] A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
    Chen M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2158 - 2176
  • [33] Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security
    Giron, Alexandre Augusto
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 : 363 - 371
  • [34] Post-quantum Diffie-Hellman and symmetric key exchange protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Damikka
    Anshel, Michael
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 382 - +
  • [35] Post-Quantum Signal Key Agreement from SIDH
    Dobson, Samuel
    Galbraith, Steven D.
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 422 - 450
  • [36] Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography
    Sabani, Maria E.
    Savvas, Ilias K.
    Garani, Georgia
    SIGNALS, 2024, 5 (02): : 216 - 243
  • [37] Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
    Buser, Maxime
    Liu, Joseph K.
    Steinfeld, Ron
    Sakzad, Amin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 892 - 912
  • [38] Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
    Gao, Xinwei
    Li, Lin
    Ding, Jintai
    Liu, Jiqiang
    Saraswathy, R., V
    Liu, Zhe
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 551 - 565
  • [39] QUIC Protocol with Post-quantum Authentication
    Raavi, Manohar
    Wuthier, Simeon
    Chandramouli, Pranav
    Zhou, Xiaobo
    Chang, Sang-Yoon
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 84 - 91
  • [40] Hybrid Post-Quantum Enhanced TLS 1.3 on Embedded Devices
    Marchsreiter, Dominik
    Sepulveda, Johanna
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 905 - 912