Modernizing PKI to Prepare for PQC
Encryption Consulting LLC
World's Leading Provider of Applied Cryptography
As the quantum era rapidly approaches, it is no longer a distant possibility. In a significant development, the National Institute of Standards and Technology (NIST) has announced an official deadline for transitioning away from outdated encryption algorithms. By 2030, algorithms such as RSA, ECDSA, EdDSA, DH, and ECDH will be deprecated, and by 2035, they will be entirely disallowed.
It is imperative to adopt quantum-resistant capabilities to protect sensitive data against quantum threats, such as Harvest Now Decrypt Later. The urgency in this message was highlighted on August 13, 2024, when the first three quantum-resistant algorithms were released: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) in existing cryptographic infrastructure.
As Dustin Moody, who heads?the PQC standardization project, mentioned, “We encourage system administrators to start integrating them into their systems immediately because full integration will take time.”
The organizations that succeed in this transition won’t be the ones that are the fastest to adapt, they will be the ones who approach PQC with foresight, purpose, and understanding.
Role of PQC in Public Key Infrastructure (PKI)
Even as quantum computing presents new threats, Public Key Infrastructure (PKI) remains the backbone of securing digital communications. PKI ensures that digital certificates are trustworthy, and with the integration of PQC, these certificates will continue to protect the integrity and authenticity of communications in the quantum era.
To establish secure communication, the browser checks a website’s digital certificate to verify its authenticity. This certificate includes a public key used for encryption and is issued by a trusted organization (Certificate Authority). The verification process relies on traditional cryptographic algorithms like RSA or ECDSA to ensure the website is legitimate and the connection is secure.
Here’s where PQC comes into play. By updating PKI to use quantum-resistant algorithms, we can ensure that these digital certificates remain trustworthy in the quantum era. When we visit that secure website, the browser will verify the site’s certificate using quantum-resistant algorithms, keeping sensitive data safe and secure.
PKI Modernization is the First Step Towards Quantum-Resilient Security
As quantum computing looms on the horizon, modernizing PKI is a critical first step toward achieving quantum-resilient security. Let’s break down the key characteristics of PQC-Ready PKI:
PQC-Ready PKI
Achieving a Post-Quantum Cryptography (PQC)-Ready Public Key Infrastructure (PKI) involves several key steps to ensure your cryptographic systems can withstand the threats posed by quantum computing. Below are the following steps on how to achieve PQC-Ready PKI.
Issuing CA and Root CA for PQC
Creating a Root CA and Issuing CA for PQC involves adopting quantum-resistant cryptographic algorithms for both key management and certificate signing. Here’s a step-by-step breakdown:
Root CA
Issuing CA
Issue PQC Composite Certificates
PQC composite certificates combine traditional and post-quantum algorithms, easing the transition to quantum-safe systems. By managing these hybrid certificates, organizations can integrate Dilithium (ML-DSA) or other quantum-safe algorithms alongside RSA/ECDSA algorithms.
Switch to TLS 1.3
It is recommended that TLS 1.3 be used as a base for PQC implementation. Configure the server to use TLS 1.3 and select appropriate cipher suites that incorporate post-quantum key exchange algorithms (like ML-KEM) and digital signature schemes (like Dilithium) instead of traditional, non-quantum resistant algorithms, effectively replacing the current key exchange and signature mechanisms with PQC counterparts within the TLS 1.3 handshake process.
Although integrating PQC into TLS 1.3 may result in slightly increased handshake overhead due to larger key sizes, optimization is ongoing to minimize the performance impact.
Governance is the Key
Without clear cryptographic policies and defined roles, a sophisticated Public Key Infrastructure (PKI) system can become chaotic. It is important to have standardized processes for managing keys, certificates, and cryptographic operations so everything operates smoothly. Here are some tips to manage the Governance factor in the PKI environment.
Modernization Equals Automation
Automation plays a critical role in PKI modernization. From certificate issuance to revocation and renewal, automating these processes will streamline operations, reduce manual errors, and enhance the efficiency of your PKI infrastructure. It is always a good idea to keep the Certificate Lifecycle Management on tip-toe for the crypto-agility using features like one-click CA shifts.
The clock is ticking. The shift from SHA-1 to SHA-2 took over 12 years across industries. With quantum threats emerging sooner than expected, we cannot afford to wait another decade for this transition.
Key Recommendations to achieve PQC readiness in PKI
The following recommendations will guide organizations in adapting their PKI infrastructure to be quantum-resistant and future-proof.
Challenges in PKI transition for post-quantum era
While transitioning to PQC is essential, there are several challenges, such as:
How can Encryption Consulting help?
Conclusion
In conclusion, the shift to Post-Quantum Cryptography (PQC) is an essential step to secure digital communications in the quantum era. By transitioning Public Key Infrastructure (PKI) systems to accommodate quantum-resistant algorithms, organizations can ensure their cryptographic systems remain resilient against emerging quantum threats. While the transition presents challenges, including algorithm selection and legacy system integration, proactive planning, pilot testing, and clear governance will help ease the process. Organizations that embrace PQC readiness today will not only secure their data but also position themselves as leaders in preparing for a secure, quantum-resilient future.
To learn more about the topic, visit Encryption Consulting