Andrea Pazienza, E. Lella, Pietro Noviello, Felice Vitulano
{"title":"后量子时代网络级密钥交换协议分析","authors":"Andrea Pazienza, E. Lella, Pietro Noviello, Felice Vitulano","doi":"10.1109/WOLTE55422.2022.9882818","DOIUrl":null,"url":null,"abstract":"A Virtual Private Network (VPN) ensures the confidentiality and integrity of data transferred between two endpoints, even if the means of transport are insecure. One popular protocol is Internet Protocol Security (IPSec) which operates at OSI layer 3 and protects all protocols at higher layers. Cryptographic keys in IPSec are negotiated using the Internet Key Exchange (IKE) protocol. IKE negotiates security parameters for IPSec sessions. In particular, the IKEv2 protocol uses the Elliptic Curve Diffie-Hellman (ECDH) algorithm to establish a secret key shared between two nodes on a network. Although solving such a problem remains difficult with current computing power, it is believed that generic quantum computers will be able to solve this problem, which implies that the security of IKEv2 is compromised. There are, however, several cryptographic systems that are trusted to be resistant to attacks by quantum computers. This family of cryptosystems is known as quantum-resistant cryptography (QRC). In this paper, after highlighting the requirements for a secure key exchange protocol, we briefly review the QRC solutions that have been proposed in the recent literature.","PeriodicalId":299229,"journal":{"name":"2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era\",\"authors\":\"Andrea Pazienza, E. Lella, Pietro Noviello, Felice Vitulano\",\"doi\":\"10.1109/WOLTE55422.2022.9882818\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A Virtual Private Network (VPN) ensures the confidentiality and integrity of data transferred between two endpoints, even if the means of transport are insecure. One popular protocol is Internet Protocol Security (IPSec) which operates at OSI layer 3 and protects all protocols at higher layers. Cryptographic keys in IPSec are negotiated using the Internet Key Exchange (IKE) protocol. IKE negotiates security parameters for IPSec sessions. In particular, the IKEv2 protocol uses the Elliptic Curve Diffie-Hellman (ECDH) algorithm to establish a secret key shared between two nodes on a network. Although solving such a problem remains difficult with current computing power, it is believed that generic quantum computers will be able to solve this problem, which implies that the security of IKEv2 is compromised. There are, however, several cryptographic systems that are trusted to be resistant to attacks by quantum computers. This family of cryptosystems is known as quantum-resistant cryptography (QRC). In this paper, after highlighting the requirements for a secure key exchange protocol, we briefly review the QRC solutions that have been proposed in the recent literature.\",\"PeriodicalId\":299229,\"journal\":{\"name\":\"2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE)\",\"volume\":\"217 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOLTE55422.2022.9882818\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOLTE55422.2022.9882818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era
A Virtual Private Network (VPN) ensures the confidentiality and integrity of data transferred between two endpoints, even if the means of transport are insecure. One popular protocol is Internet Protocol Security (IPSec) which operates at OSI layer 3 and protects all protocols at higher layers. Cryptographic keys in IPSec are negotiated using the Internet Key Exchange (IKE) protocol. IKE negotiates security parameters for IPSec sessions. In particular, the IKEv2 protocol uses the Elliptic Curve Diffie-Hellman (ECDH) algorithm to establish a secret key shared between two nodes on a network. Although solving such a problem remains difficult with current computing power, it is believed that generic quantum computers will be able to solve this problem, which implies that the security of IKEv2 is compromised. There are, however, several cryptographic systems that are trusted to be resistant to attacks by quantum computers. This family of cryptosystems is known as quantum-resistant cryptography (QRC). In this paper, after highlighting the requirements for a secure key exchange protocol, we briefly review the QRC solutions that have been proposed in the recent literature.