Understanding How PKI Certificates Power Encryption: A Technical Exploration
Daniel Aldam
Award-Winning CISO | Strategic Leadership in Cybersecurity | Security Programs Architect | GRC & Security Operations Expert | Proven Team Leader | Mentor
This article is the second of three, in which I describe the future of PKI, and the inherent trust we place in companies and individuals that we have no relationship with all aspects of our digital lives.
Public Key Infrastructure (PKI) plays a crucial role in securing communications over the internet, providing the foundation for encryption protocols like SSL/TLS that protect data in transit. For those in technical roles who are not cryptographers, understanding how PKI certificates are used in encryption is essential. This article will explore the fundamentals of symmetric and asymmetric encryption, the role of RSA and Diffie-Hellman in PKI, the evolution of SSL/TLS, vulnerabilities inherent in these protocols, and the emerging challenges posed by quantum computing.
Symmetric vs Asymmetric Encryption
Encryption can broadly be classified into two categories: symmetric and asymmetric.
The Role of RSA and Diffie-Hellman in PKI
Two fundamental algorithms underpin asymmetric encryption in PKI: RSA and Diffie-Hellman.
In PKI, asymmetric encryption is often used to securely exchange a symmetric key, which is then used to encrypt the actual data. This hybrid approach leverages the strengths of both encryption types: the security of asymmetric encryption and the efficiency of symmetric encryption.? A compromise of the asymmetric encryption will result in the compromise of the symmetric encryption.
The Evolution of SSL/TLS
Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are the protocols that implement encryption over the internet. They provide the security backbone for HTTPS, ensuring that data transmitted between a web server and a client remains confidential and tamper-proof.
Despite these advancements, no protocol is entirely immune to vulnerabilities, particularly as computing power increases and new attack vectors are discovered.
The Mathematics of Asymmetric Encryption: Prime Factorisation
At the heart of RSA’s security is the difficulty of prime factorisation. Prime numbers are integers greater than 1 that have no divisors other than 1 and themselves. The RSA algorithm leverages the fact that, while it is straightforward to multiply two large prime numbers, it is exponentially harder to factor the resulting product back into its original primes. This asymmetry in difficulty underpins the security of RSA, as there is no known efficient algorithm for prime factorisation—a problem that remains unsolved in mathematics.
Side-Channel Attacks: Beyond Mathematical Security
Even if an encryption algorithm is mathematically sound, it can still be vulnerable to side-channel attacks. These attacks exploit physical or implementation weaknesses rather than attempting to break the encryption directly.
The Quantum Computing Threat
Quantum computing represents a paradigm shift in computing power, capable of solving complex problems exponentially faster than classical computers. One such problem is prime factorisation, which RSA relies on for security. Shor’s algorithm, a quantum algorithm, could theoretically factor large numbers in polynomial time, rendering RSA and similar encryption methods obsolete.
While true quantum computers capable of breaking RSA are not yet a reality, experts believe we are on the cusp of a breakthrough. Some estimates suggest that within the next 10 to 20 years, quantum computing could become feasible for business applications. The December 2023 Microsoft breach, while ultimately not attributed to quantum computing, highlighted the industry's concerns about how close we are to such a breakthrough, as it was legitimately considered as the root cause in this major security incident.
The NSA and RSA: Historical Context
There is evidence to suggest that the NSA may have influenced the design of certain cryptographic algorithms, including RSA, potentially inserting backdoors or weakening them. Documents leaked by Edward Snowden revealed that the NSA had actively worked to undermine global encryption standards, raising concerns about the integrity of widely used algorithms.
The Need for Quantum-Resistant Algorithms
Given the potential of quantum computing to break current encryption methods, adversaries are already capturing and storing encrypted communications with the expectation that they can decrypt them in the future. This highlights the urgent need to develop and adopt quantum-resistant algorithms, even though the quantum threat has not yet materialised. Organisations must start planning now to ensure that their data remains secure in a post-quantum world.
Conclusion
PKI and the encryption methods it supports are fundamental to the security of our digital infrastructure. Understanding the principles behind symmetric and asymmetric encryption, the evolution of SSL/TLS, and the emerging threats posed by quantum computing is crucial for anyone involved in securing communications. As we look to the future, the development and adoption of quantum-resistant algorithms will be essential to maintaining trust and security in our digital world.
?