18
Quantum-Safe Migration with Crypto- Agile Certificates

Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Quantum-Safe Migration with Crypto-Agile Certificates

Page 2: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

01 Long Term SecurityQuantum-safe security is a key enabler for long termsecurity. Healthcare will be able to benefit greatly from quantum-safe security.

02 Redundant DatabasesRedundancy with distributed databases are important for disaster recovery of data.

03 Quantum-safe DatabasesQuantum-safe distributed databases were constructed using QKD connections

Healthcare LINCOS (H-LINCOS)

Now that storage is quantum-safe, let’s look at access control…

Page 3: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Testbed of H-LINCOS

Shareholder

Layer-3 private channel

Secret sharing network

Shareholder

Science Center

Root CACertificates

NICTUser devices User devices

Kochi U Tech

Controller

Layer-2 private channel

Gateway server

Data owner server

Osaka

Otemachi

Certificates

Gateway server

ShareholderNagoya

KoganeiShareholder

Authentication Access control Access right

management

- PKI

- PKI/TLS

Legend

Page 4: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

01 Requirements Use of Healthcare Public

Key Infrastructure (H-PKI) Quantum-safe

Authentication

02 Design Decisions Use of quantum-safe TLS

between terminals and gateway-server for secrecy

Use H-PKI with quantum-safe authentication

Use identity information is H-PKI Certificate for finer access control

03 Investigation Objectives Evaluate feasibility of

quantum-safe TLS with client authentication

Assess importance of Crypto Agility

Access Control in H-LINCOS

Page 5: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Challenges in Quantum-safe TLS/PKI - Crypto Uncertainty

Standardized at IETF In progress at NISTStateful signature algorithms: LMS XMSSCode signing and certificate signing by CA’s

Stateless signatures: These are signatures that are needed for end entity’s signing operation during the protocol handshake

01 02

Page 6: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Challenges in Quantum-safe TLS/PKI- Crypto UncertaintyFor entity’s signing, the cryptography must be agile to cope with: Parameter changes Slight algorithm changes

Page 7: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Challenges in Quantum-safe TLS/PKI- Size and Complexity

Refer to today’s PKI deployments: PKI is ubiquitous, complex, and

inter-dependent, e.g., Internet websites (https) Government and enterprise access

control T

Todays PKI uses RSA or ECC! We must migrate to Quantum-

Safe!

Page 8: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

THE SOLUTION: CRYPTO-AGILITY

The ability to react to cryptographic threats quickly, at a systems level. It bridges the gap between current and quantum-safe security methods.

Today ?

Quantum-safe Cryptography

Current Public Key Cryptography

Crypto-agile solutions = current + quantum-safe

Page 9: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

9

Maintain Interoperability

Maintain the current interoperability between your current systems and

allow for backwards compatibility

Migrate FasterBy implementing a crypto-

agile solution, you’ll be able to migrate critical systems

faster

Reduce Switching Costs

An agile switch will have no need to duplicate two entire

systems: one original and one quantum safe, thus

saving on switching costs.

Crypto-Agility Objectives

Page 10: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Catalyst: Crypto-Agile CertificateID Info

Classical Public Key

Quantum-safe Public Key

Quantum-safe Signature

Classical Signature

Secured by Classical

Secured by Quantum-safe

ISARA CatalystExtension

Page 11: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Phased Migration

IntermediateCA 1

IntermediateCA 2

IntermediateCA 3

Root CA

Classical Digital Certificate

Quantum-safe Digital Certificate

Page 12: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Experiment with Server Authentication of TLS

Classical ClientQuantum-safe

Client

Classical Signature

Quantum-safe Signature

Page 13: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Experiment with Client Authentication of TLS

Classical ClientQuantum-safe

Client

Classical Signature

Quantum-safe Signature

Page 14: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

System Construction

Microsoft Windows 10Professional 64 bits

User device

Web browser

TLS

PQ-PKI certificate storeCertificate for healthcare worker

Root certificate

- PQ-signature- PQ-key exchange

CentOS 764 bits

Gateway server

Web server

TLS

- PQ-signature- PQ-key exchange

Medical records

PQ-TLS

TCP/IP

PQ-PKI certificate storeCertificate for gateway server

Root certificate

Page 15: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Some Preliminary Results

Server AuthenticationWorked.

Client AuthenticationWorked.

Crypto-agility Achieved

Page 16: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

Future Study

Update Signatures

In future iterations of this project we would

look to update the Quantum-safe Digital

Signature Algorithms to their latest versions.

Introduce Intermediate CAs

We would look to introduce intermediate

CAs to assess the impacts of certificate

chains, and examine a larger scale network

migration.

Key Encapsulation

By considering a Key Encapsulation

Mechanism (KEM) instead of a Key

Exchange we could conform to NIST

proposals.

Deploy TLS 1.3

We would look into the possibility of deploying Transport Layer Security

(TLS) protocol 1.3, which is more KEM

friendly.

Page 17: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

H-LINCOS - Summary & Next Steps

NICT has added the quantum-safe H-PKI based access control with quantum-safe TLS in the lab

Next Steps: Field tests for a larger network setting

TU Darmstadt introduced PROPYLA & ELSA to address APH and large data

Next Steps: Integrate into larger system to further study feasibility

ISARA provided quantum-safe TLS with Catalyst certificates

Next Steps: Update with NIST proposals and Catalyst certificate standards

Page 18: Quantum-Safe Migration with Crypto- Agile Certificates · 2018-11-12 · Quantum-safe Authentication 02Design Decisions Use of quantum-safe TLS between terminals and gateway-server

[email protected]

Join us on social

@ISARACorp @ISARACorp @ISARACorporation

CLEARING THE PATH TOQUANTUM-SAFE SECURITY