+ All Categories
Home > Documents > A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective...

A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective...

Date post: 20-Mar-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
13
A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh Rakesh Singh Rawat Centre for Development of Telematics (C-DOT), New Delhi, India www.cdot.in
Transcript
Page 1: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

A Low-cost and Time-effectiveApproach for Migration of LegacyIP Networks to Post-QuantumSecurity

By

Prashant Chugh

Rakesh Singh Rawat

Centre for Development of Telematics (C-DOT), New Delhi, India

www.cdot.in

Page 2: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Introduction

There are two Fundamental Techniques to implement Post-Quantum Security:

➢Post-Quantum-Cryptography (PQC)

This is based on hard problems in Mathematics

➢Quantum-Key-Distribution (QKD)This is based on fundamentals of Quantum Physics

Each of these techniques has its advantages as well as disadvantages

Page 3: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

PQC-based technique of Post-Quantum Security

Advantages

➢Minimal or No Hardware Changes required. All or most changes canusually be implemented in Software only

➢Less costly, easy to implement and easy to deploy

➢Time-effective

➢Suitable for deployment in legacy as well as green-field projects

Disadvantages

➢There are multiple categories of PQC algorithms under-standardization andwithin each category there are multiple algorithms

➢PQC algorithms are based on hard maths problems and as on date, regresscryptographic security proofs do not exist of most algorithms

Page 4: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

QKD-based technique of Post-Quantum Security

Advantages:

➢Based on Foundations of Quantum Physics, some experts argue thatQKD is fundamentally more secure than PQC-based technique so itmay be more secure than PQC-based technique in a long-run

Disadvantages:

➢QKD-based technique requires extensive changes in Hardware

➢QKD may be more suitable for deployment in greenfield Projectsrather than in legacy projects

➢Because of costly components involved, QKD is usually much moreexpensive than PQC-based technique of Quantum-safe Security

➢More time is required for QKD implementation as well as deployment

Page 5: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Challenges in Implementing Post-Quantum Security in Legacy IP Networks

Challenge 1Which of the two fundamental techniques is to be used for achievingPost-Quantum Security?➢Quantum-Key-Distribution (QKD)

OR➢Post-Quantum-Cryptography (PQC)

Challenge 2If PQC is selected for implementation, then also an implementer is indilemma to select a particular➢PQC algorithm category➢PQC candidate algorithm within that category

Page 6: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Challenge 3

Legacy IP Networks carry live traffic so Downtime during Quantum-safemigration has to be minimal. Hence, Migration has to be time-effective.

Challenge 4

Legacy IP Network have very Limited Budgets available for Support andEnhancements. Hence, Quantum-safe migration has to be low-cost.

Challenge 5

Many stakeholders managing Legacy IP networks currently believe that thethreat from Quantum computers is not immediate so they do not want toinvest immediately in Quantum-safe migration. Hence, we need to have agraded-response based strategy for Quantum-safe migration i.e.investment in Quantum-safe migration should be currently minimal andincrease as the threat perception increases.

continued….Challenges in Implementing Post-Quantum Security in Legacy IP Networks

Page 7: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

A Simplistic Representative View of our Legacy IP Network which is to be migrated to Post-Quantum Security

IP-Servers

Networking Cloud (Multiple L2

Switches and/or L3 IP Routers)

IP-Servers

IP-Phones

Page 8: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Lab Experiments to evolve Migration Approach

Experiment 1

Implementation of PQC algorithms in end devices of Legacy IP

Network

➢Hybrid key-exchange combining classical key-exchange with Post-Quantumkey-exchange of at least one lattice-based key-exchange and/or one code-based key exchange was implemented

➢Symmetric Encryption/Decryption Algorithm as AES-256 was implemented

Lessons Learnt:

➢Software changes can be done for those end devices which were in-housedeveloped. It was sometimes very difficult to do these changes for COTSdevices

Page 9: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Experiment 2Development of a Network-Layer Encryption Product

➢This product for Encryption at Network Layer implements:▪ Hybrid key-exchange combining classical key-exchange with Post-Quantum

key-exchange of at least one lattice-based key-exchange and/or one code-based key exchange

▪ Symmetric Encryption/Decryption of data using AES-256 algorithm

➢This product was used as a network gateway of those IP end deviceswhere knowhow of communication software was not available

Lessons Learnt:

➢A network-layer encryption product helps to enable PQC for IP enddevices where knowhow of communication software was notavailable in-house (such as COTS devices)

Page 10: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

Experiment 3Enhancements in Network-layer Encryption product to accept keys from an external QKD-based system

➢Software on network-layer Encryption product was enhanced to acceptcipher keys from an external QKD-based system

➢Configuration options have been provided to either use the cipher keysgenerated using Hybrid key-exchange or the ones that have been sent byan external QKD-based system (or a combination of both)

Lessons Learnt:

➢PQC-based hybrid-key exchange is used currently in Network-layerEncryption product. The additional configuration Capability to use keysfrom QKD-based system allows QKD-based migration in future

Page 11: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

A Simplistic Representative View of our Legacy IP Network after Proof-of-Concept Quantum-Safe Migration in Lab

IP-Servers

Networking Cloud (Multiple L3 IP Routers)

IP-Servers

L2-Switch

L2-Switch

PQC-Enabled Network Layer Encryptor

PQC-EnabledNetwork-layer Encryptor

PQC-EnabledNetwork-Layer Encryptor

PQC-Enabled Network-Layer Encryptor

L2-SwitchPQC-Enabled Network-Layer Encryptor

QKD * System

QKD * System

QKD * System

* External System (Not a part of Network-layer Encryptor)

IP-Phones

Page 12: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

SUMMARY➢Implementation of only PQC-based technique currently and keeping a

provision for using a QKD-based approach in future is our solution to thechallenge of selecting the Quantum-safe migration technique for Legacy IPNetworks

➢Implementation of multiple under-standardization PQC algorithms andusing it in a hybrid manner with classical key-exchange solves the problemof selection of one PQC algorithm

➢Implementation of only PQC-based technique currently for Quantum-safemigration solves the challenge of not-only keeping the cost low but also thechallenge of keeping implementation & deployment time-effective

➢Implementation in a Network-layer Encryption product rather than in alarge number of diverse IP end devices helps in keeping migration time-effective

➢Configuration Capability in Network-layer Encryption product to use keysfrom QKD-based system in future helps in making a graded-response-basedmigration strategy

Page 13: A low-cost and time-effective Approach for migration of ... · A Low-cost and Time-effective Approach for Migration of Legacy IP Networks to Post-Quantum Security By Prashant Chugh

THANK YOU

E-mail: Prashant Chugh <[email protected]> Rakesh Singh Rawat <[email protected]>

www.cdot.in


Recommended