Skip to main content
Log in

Use of hybrid post-quantum key exchange in internet protocols

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3 and IKEv2 as examples.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The diagram below follows the convention from [9]. In addition, protocol field that contains combined public keys is underlined.

  2. Two diagrams below follow the conventions from [11]. In addition, bold typeface is used to depict protected messages, italic font is used to depict newly introduced exchanges and public keys of additional key exchanges are underlined.

  3. Two diagrams below follow the conventions from [11]. In addition, shared keys from additional key exchanges are underlined.

References

  1. Grover, L. K.: A fast quantum mechanical algorithm for database search, 1996, https://arxiv.org/abs/quant-ph/9605043

  2. Shor, P. W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, 1996, https://arxiv.org/abs/quant-ph/9508027

  3. Bernstein, D. J.: Introduction to post-quantum cryptography, 2009, https://pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf

  4. S. Fluhrer, Cryptanalysis of ring-LWE based key exchange with key share reuse, 2016, https://eprint.iacr.org/2016/085

  5. Krawczyk H.: SIGMA: the ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols, (2003)

  6. Driscoll, F.: Terminology for Post-Quantum Traditional Hybrid Schemes, draft-ietf-pquip-pqt-hybrid-terminology (work in progress), https://datatracker.ietf.org/doc/draft-ietf-pquip-pqt-hybrid-terminology/

  7. Bernstein, D. J.: (djb@cr.yp.to), e-mail message to the CFRG mailing list (cfrg@irtf.org) with subject “NSA vs. hybrid”, Fri, 12 Nov 2021 09:28:11UTC, https://mailarchive.ietf.org/arch/msg/cfrg/T3XgKeJr4-PvmPrS5TwVNfW9t_w/

  8. Ounsworth, M., Wussler, A., Kousidis, S.: Combiner function for hybrid key encapsulation mechanisms (Hybrid KEMs), draft-ounsworth-cfrg-kem-combiners (work in progress), https://datatracker.ietf.org/doc/draft-ounsworth-cfrg-kem-combiners/

  9. Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3, RFC 8446, August 2018, https://www.rfc-editor.org/rfc/rfc8446.html

  10. Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3, draft-ietf-tls-hybrid-design (work in progress), https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/

  11. Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, T.: Internet Key Exchange Protocol Version 2 (IKEv2), RFC 7296, October 2014, https://www.rfc-editor.org/rfc/rfc7296.html

  12. Tjhai, C. J., Tomlinson, M., Bartlett, G., Fluhrer, S., Van Geest, D., Garcia-Morchon, O., Smyslov, V.: Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2), RFC 9370, May 2023, https://www.rfc-editor.org/rfc/rfc9370.html

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Valery Smyslov.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Smyslov, V. Use of hybrid post-quantum key exchange in internet protocols. J Comput Virol Hack Tech (2024). https://doi.org/10.1007/s11416-024-00515-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11416-024-00515-3

Keywords

Navigation