Advances in quantum computing necessitate migrating the entire technology stack to post-quantum cryptography. This includes IPsec-based VPN connection authentication. Although there is an RFC draft for post-quantum authentication in this setting, the draft does not consider (stateful) hash-based signatures despite their small signature size and trusted long-term security. We propose a design with time-based state-management that assigns VPN devices a certificate authority (CA) based on the hash-based signature scheme XMSS. The CA then issues leaf certificates which are based on classical cryptography but have a short validity time, e. g., four hours. It is to be expected that even large quantum computers will take significantly longer to break the cryptography, making the design quantum-secure. We propose strategies to make the timekeeping more resilient to faults and tampering, as well as strategies to recognize a wrong system time, minimize its potential damage, and quickly recover. The result is an OpenBSD implementation of a quantum-safe and, regarding the leaf certificates, highly flexible VPN authentication design that requires significantly less bandwidth and computational resources compared to existing alternatives.
翻译:量子计算的进步要求整个技术栈迁移至后量子密码学,这包括基于IPsec的VPN连接认证。尽管已有针对该场景的后量子认证RFC草案,但该草案未考虑(有状态的)哈希基签名方案,尽管其签名尺寸小且具有可信的长期安全性。我们提出一种基于时间状态管理的设计方案,为VPN设备分配一个基于哈希签名方案XMSS的证书机构(CA)。该CA随后颁发基于经典密码学但有效期较短(例如四小时)的叶证书。可以预期,即使大型量子计算机也需要远长于此的时间来破解该密码体系,从而使该设计具备量子安全性。我们提出了增强时间记录对故障与篡改的抵御能力的策略,以及识别系统时间错误、最小化其潜在损害并快速恢复的策略。最终实现了一个OpenBSD系统上的量子安全VPN认证方案,该方案在叶证书层面具有高度灵活性,且相比现有方案显著降低了带宽与计算资源需求。