Post Quantum Cryptography: Kenny Paterson Information Security Group @kennyog
Post Quantum Cryptography: Kenny Paterson Information Security Group @kennyog
Post Quantum Cryptography: Kenny Paterson Information Security Group @kennyog
Kenny Paterson
Information Security Group
@kennyog
Lifetime of a Hash Algorithm – SHA-1
3
Progress in Quantum Computing
http://en.wikipedia.org/wiki/Timeline_of_quantum_computing
Pre 1994: isolated contributions by Wiesner, Holevo, Bennett, etc.
1994: Shor’s algorithm – breaks discrete log and factoring problems with poly many gates and depth.
1996: Grover’s algorithm – quadratic speed up for search problems, applicable to exhaustive key search.
1998: 2-qubit and 3-qubit NMR
2000: 5-qubit and 7-qubit NMR.
2001: The number 15 is factored!
2005: qbyte announced (8 qubits?)
2006: 12 qubits. (D-Wave: quantum annealing machine)
2007: 28 qubits.
2008: 128 qubits.
2011: 14 qubits.
2012: The number 21 is factored!
2013 - 2017: ???
Late 2016 onwards: physicists switch focus to quantum supremacy as their success metric.
2017: D-Wave 2000Q, with 2000 qubits; IBM unveils 17-qubit machine; Google, MSR doing cool stuff.
4
(Weak) Analogies
• The threat of large-scale quantum computing is weakly analogous to the threat of a break-
through in SHA-1 collision finding.
• Breakthrough might be imminent, but then again it might not.
• Hard to quantify risk that it will happen, and hard to put time-frame on it.
• Meaningful results would have substantial impact.
• Smart people are working on it and have had a lot of research investment.
• (There are different physical approaches being pursued.)
6
Ways Forward?
7
Ways Forward – PQC
8
Ways Forward – PQC
• PQC characteristics
• Current PQC schemes are generally not as performant as pre-quantum schemes.
• Typically larger public keys, larger key exchange messages/ciphertexts.
• Particularly challenging to deploy in low-power/wireless/IoT.
• Often faster cryptographic operations – just matrix multiplication plus noise in
some cases.
• Performance may suffer even more as we refine our understanding of how to
choose parameters for security.
• Better attacks implies larger parameters are needed.
• Or, eventually, abandonment of a particular approach.
9
Ways Forward – PQC
10
Ways Forward – PQC
NIST process, 2016 – 2023(ish) for standardising post-quantum public key algorithms.
• http://csrc.nist.gov/groups/ST/post-quantum-crypto/
• Deadline for submissions is Nov 30, 2017
• Evaluation criteria: security, cost, flexibility/simplicity/adoptability.
• Process (5-7 years):
• First conference (Feb. 2018)
• 12-18 month evaluation period – public and NIST staff.
• Second conference.
• (Optional tweaking.)
• 12-18 month evaluation period.
• Third conference.
• Publication of report and portfolio OR decision for further evaluation.
11
But What About Quantum Cryptography?
12
QKD
13
QKD
Another example:
14
QKD
15
QKD
17
QKD or PQC? The NCSC/GCHQ View
• CFRG has done some useful work on developing IDs for hash-
based signatures.
• draft-irtf-cfrg-xmss-hash-based-signatures-09
• draft-mcgrew-hash-sigs-07
• Mature, well-understood area, less risky in security terms.
• Other post-quantum schemes are still in their difficult teenage
years in research terms.
• Never mind standardisation and deployment experience.
• NIST’s announced process is where the action will be.
• NIST have the resources needed to run a proper process.
• The scientific experts will be concentrating their efforts there.
19
What Should IETF Do?
My personal view:
• IETF should wait for NIST’s process to run its course.
• But we should be ready to roll-over to new algorithms once they are
finalised.
• Continue to avoid baking-in algorithms, either explicitly or implicitly
(e.g. via maximum field sizes).
• Keep an eye on key exchange flow characteristics and understand
implications for protocol latency/round trips.
• Understand how to combine pre- and post-quantum elements to
make hybrid schemes.
• Identify and resist efforts to pre-empt NIST process by “SDO
shopping”.
20
Concluding Remarks
21
Fin
Thanks.
Discussion!
22
Extra Slides
23
1. QKD Does Not Solve the Key Distribution Problem
24
1. QKD Does Not Solve the Key Distribution Problem
26
2. QKD Has Limits on Rate and Range
29
3. Security in Theory vs Security in Practice