1 / 12

Post Quantum Secure Cryptography Discussion

Post Quantum Secure Cryptography Discussion. mcgrew@cisco.com CFRG @ IETF95. C. F. R. G. 4/8/16. PQC Discussion at IETF95. 1. About these slides. The intent of these slides is to facilitate a discussion on post quantum secure cryptography at CFRG @ IETF95

jslade
Download Presentation

Post Quantum Secure Cryptography Discussion

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Post Quantum Secure Cryptography Discussion mcgrew@cisco.com CFRG @ IETF95 C F R G 4/8/16 PQC Discussion at IETF95 1

  2. About these slides • The intent of these slides is to facilitate a discussion on post quantum secure cryptography at CFRG @ IETF95 • They do not represent any official position of CFRG or anyone else 4/8/16 PQC Discussion at IETF95 2

  3. What are the PQC use cases? • Software/Firmware signatures • Long-term confidentiality • Resist "store now, break later "attacks • Long-term secure remote management • Other? 4/8/16 PQC Discussion at IETF95 3

  4. Where is PQC on the list of priorities? • Priority • Threat Robustness Faithfulness New Curves Post Quantum Security Performance Heartbleed, side channels Algorithm substitution ECC authors Quantum Computers Non-adoption of crypto 4/8/16 PQC Discussion at IETF95 4

  5. What IETF standards need PQC? • Standard • Use case SMIME TLS IPSec SSH Kerberos … Software/firmware Confidentiality, Mgmt Confidentiality Mgmt Confidentiality … 4/8/16 PQC Discussion at IETF95 5

  6. On PQC adoption timeline is PQC adoption needed? • Research/standards/implementation/adoption • Field upgradability • New algorithms need X years of study • What old algorithms have PQ security? 4/8/16 PQC Discussion at IETF95 6

  7. What are barriers to PQC adoption? • Key and signature sizes • Computational cost • Lack of algorithm agility 4/8/16 PQC Discussion at IETF95 7

  8. What approaches are needed? Easy • Supersize symmetric crypto • Use asymmetric crypto less often • Hash based signatures • Software/firmware signing • Lattice based encryption • Lattice based key establishment • Ephemeral OK; Static? • Code based cryptography • Quantum Key Distribution Easy Not hard Need review Need review Size problems Inapplicable 4/8/16 PQC Discussion at IETF95 8

  9. PQC Algorithm Standards Work • NIST • ETSI • Fall 2016 Call For Proposals • Nov 2017 Deadline for submissions • 3-5 years - Analysis phase • NIST will report its findings • 2 years later - Draft standards ready • PQC Workshops • Sept 2016 Toronto • Algorithms • QKD 4/8/16 PQC Discussion at IETF95 9

  10. How can CFRG help develop PQC algorithm standards? • Build community of interest • Internet PQC problem statement • Document PQC status of algorithms/protocols • Coordinate with NIST and other national standards bodies • Other? 4/8/16 PQC Discussion at IETF95 10

  11. How can CFRG help adoption of PQC in IETF standards? • Develop recommendations • Symmetric: PQC, asymmetric: agile • Standards review • Spread awareness 4/8/16 PQC Discussion at IETF95 11

  12. EOF 4/8/16 PQC Discussion at IETF95 12

More Related