Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

被引:177
|
作者
Bos, Joppe W. [1 ]
Costello, Craig [2 ]
Naehrig, Michael [2 ]
Stebila, Douglas [3 ]
机构
[1] NXP Semicond, Eindhoven, Netherlands
[2] Microsoft Res, Redmond, WA USA
[3] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
SECURITY; ALGORITHMS; ENCRYPTION;
D O I
10.1109/SP.2015.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing ciphersuites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem; we accompany these ciphersuites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE ciphersuites integrated into the OpenSSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
引用
收藏
页码:553 / 570
页数:18
相关论文
共 50 条
  • [41] Post-quantum identity-based authenticated multiple key agreement protocol
    Yang, Yang
    Yuan, Hongji
    Yan, Linbo
    Ruan, Yinglan
    ETRI JOURNAL, 2023, 45 (06) : 1090 - 1102
  • [42] Post-quantum secure authenticated key agreement protocol for wireless sensor networks
    Singh, Mrityunjay
    Mishra, Dheerendra
    TELECOMMUNICATION SYSTEMS, 2023, 84 (1) : 101 - 113
  • [43] Post-quantum secure authenticated key agreement protocol for wireless sensor networks
    Mrityunjay Singh
    Dheerendra Mishra
    Telecommunication Systems, 2023, 84 : 101 - 113
  • [44] Integration of Quantum Key Distribution in the TLS Protocol
    Elboukhari, Mohamed
    Azizi, Mostafa
    Azizi, Abdelmalek
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 21 - 28
  • [45] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [46] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [47] Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
    Aysu, Aydin
    Tobah, Youssef
    Tiwari, Mohit
    Gerstlauer, Andreas
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 81 - 88
  • [48] Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era
    Pazienza, Andrea
    Lella, Eufemia
    Noviello, Pietro
    Vitulano, Felice
    2022 IEEE 15TH WORKSHOP ON LOW TEMPERATURE ELECTRONICS (WOLTE 2022), 2022,
  • [49] Secure post-quantum group key exchange: Implementing a solution based on Kyber
    Pablos, Jose Ignacio Escribano
    Vasco, Maria Isabel Gonzalez
    IET COMMUNICATIONS, 2023, 17 (06) : 758 - 773
  • [50] The Superlinearity Problem in Post-quantum Blockchains
    Park, Sunoo
    Spooner, Nicholas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2023, PT I, 2024, 13950 : 200 - 217