Quantum computers could break currently used asymmetric cryptographic schemes in a few years using Shor's algorithm. They are used in numerous protocols and applications to secure authenticity as well as key agreement, and quantum-safe alternatives are urgently needed. NIST therefore initiated a standardization process. This requires intensive evaluation, also with regard to performance and integrability. Here, the integration into TLS 1.3 plays an important role, since it is used for 90% of all Internet connections. In the present work, algorithms for quantum-safe key exchange during TLS 1.3 handshake were reviewed. The focus is on the influence of dedicated network parameters such as transmission rate or packet loss in order to gain insights regarding the suitability of the algorithms under corresponding network conditions. For the implementation, a framework by Paquin et al. was extended to emulate network scenarios and capture the handshake duration for selected algorithms. It is shown that the evaluated candidates Kyber, Saber and NTRU as well as the alternative NTRU Prime have a very good overall performance and partly undercut the handshake duration of the classical ECDH. The choice of a higher security level or hybrid variants does not make a significant difference here. This is not the case with alternatives such as FrodoKEM, SIKE, HQC or BIKE, which have individual disadvantages and whose respective performance varies greatly depending on the security level and hybrid implementation. This is especially true for the data-intensive algorithm FrodoKEM. In general, the prevailing network characteristics should be taken into account when choosing scheme and variant. Further it becomes clear that the performance of the handshake is influenced by external factors such as TCP mechanisms or MTU, which could compensate for possible disadvantages due to PQC if configured appropriately.
翻译:在几年内,量子计算机可以使用Shor算法破解当前使用的非对称加密方案。它们用于许多协议和应用程序来确保真实性以及密钥协商,并且迫切需要量子安全的替代方案。因此,NIST启动了一项标准化过程。这需要进行深入的评估,还需要考虑性能和可集成性。在此处,对TLS 1.3握手期间的量子安全密钥交换算法进行了审查。重点在于网络参数的影响,例如传输速率或数据包丢失,以便获取在相应网络条件下算法的适用性的洞察力。为了实现这一目标,扩展了Paquin等人的框架来模拟网络场景并捕捉所选算法的握手持续时间。证明了评估的候选者Kyber、Saber和NTRU以及另一种替代方案NTRU Prime在整体性能方面非常出色,并且部分低于经典的ECDH的握手持续时间。在安全级别或混合变体的选择方面并没有显著的差异。这在 FrodoKEM、SIKE、HQC或BIKE等替代方案的情况下不适用,它们具有各自的缺点,并且它们的性能因安全级别和混合实现而有很大的差异。这对于数据密集型算法FrodoKEM尤为明显。一般来说,应考虑主要的网络特性来选择方案和变体。此外,外部因素如TCP机制或MTU会影响握手的性能,如果适当配置,可能会弥补由于PQC可能带来的缺点。