skip to main content
10.1145/3386367.3431305acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
short-paper

Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

Published: 24 November 2020 Publication History

Abstract

The advances in quantum computing present a threat to public key primitives due to their ability to solve hard cryptographic problems in polynomial time. To address this threat to critical Internet security protocols like the Transfer Layer Security (TLS), and Secure Shell (SSH), the National Institute of Standards and Technology (NIST) is currently working on the new generation of quantum-resistant key encapsulation and authentication schemes. In this paper, we evaluate protocol handshake performance when both post-quantum key exchange and authentication are integrated into TLS and SSH. Our experiments consider realistic network conditions and reveal that the introduced handshake latency ranges between 1-300% for TLS and 0.5-50% for SSH depending on the post-quantum algorithms used. In addition, we examine how the initial TCP window size affects post-quantum TLS and SSH performance, and show that even a small size increase can reduce the observed post-quantum slowdown by 50%. Finally, we discuss alternatives that can encourage the early adoption of post-quantum cryptography with minimum protocol performance degradation.

Supplementary Material

MP4 File (3386367.3431305.mp4)
Presentation Video

References

[1]
Martin R Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, and Kenneth G Paterson. 2016. A surfeit of SSH cipher suites. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1480--1491.
[2]
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. 2016. Post-quantum key exchange---a new hope. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 327--343.
[3]
ANSI. 1999. The Elliptic Curve Key Agreement and Key Transport Protocols. (September 1999). American National Standards Institute, X9-Financial Services.
[4]
ANSI. 2005. ANSI X9.62, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). (September 2005). American National Standards Institute, X9-Financial Services.
[5]
Jean-Philippe Aumasson, Daniel J Bernstein, Christoph Dobraunig, Maria Eichlseder, Scott Fluhrer, Stefan-Lukas Gazdag, Andreas Hülsing, Panos Kampanakis, Stefan Kölbl, Tanja Lange, et al. 2019. SPHINCS+ - Submission to the 2nd round of the NIST post-quantum project. https://sphincs.org/data/sphincs+-round2-specification.pdf. (2019). Specification document (part of the submission package).
[6]
Sharon Boeyen, Stefan Santesson, Tim Polk, Russ Housley, Stephen Farrell, and Dave Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. (May 2008).
[7]
Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé. 2018. CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 353--367.
[8]
Joppe W Bos, Craig Costello, Michael Naehrig, and Douglas Stebila. 2015. Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In 2015 IEEE Symposium on Security and Privacy. IEEE, 553--570.
[9]
Johannes A Buchmann, Denis Butin, Florian Göpfert, and Albrecht Petzoldt. 2016. Post-quantum cryptography: state of the art. In The New Codebreakers. Springer, 88--108.
[10]
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, and Michael Schneider. 2020. Post-Quantum TLS on Embedded Systems. ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). (2020). https://eprint.iacr.org/2020/308.
[11]
Matt Campagna. 2019. Hybrid-Key Exchanges as an Interim-to-Permanent Solution to Cryptographic Agility. (June 2019). https://docbox.etsi.org/Workshop/2019/201906_ETSISECURITYWEEK/202106_DynamicNatureOfTechno/SESSION03_CHANGINGCRYPTOGRAPHY/AWS_CAMPAGNA.pdf
[12]
Chia-ling Chan, Romain Fontugne, Kenjiro Cho, and Shigeki Goto. 2018. Monitoring TLS adoption using backbone and edge traffic. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 208--213.
[13]
Jerry Chu, Nandita Dukkipati, Yuchung Cheng, and Matt Mathis. 2013. Increasing TCP's Initial Window. RFC 6928. (April 2013).
[14]
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, and Thyla van der Merwe. 2017. A comprehensive symbolic analysis of TLS 1.3. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1773--1788.
[15]
Cas J. F. Cremers, Marko Horvat, Sam Scott, and Thyla van der Merwe. 2016. Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. 2016 IEEE Symposium on Security and Privacy (SP) (2016), 470--485.
[16]
Eric Crockett, Christian Paquin, and Douglas Stebila. 2019. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In NIST 2nd Post-Quantum Cryptography Standardization Conference 2019.
[17]
Jintai Ding, Ming-Shing Chen, Albrecht Petzoldt, Dieter Schmidt, and Yang Bo-Yin. 2019. Rainbow - Algorithm Specification and Documentation. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions. (2019). The 2nd Round Proposal.
[18]
Léo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé. 2018. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. https://pq-crystals.org/dilithium/resources.shtml. (2018). Submission to round 2 of the NIST post-quantum project.
[19]
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, Jerry Chu, Tom Herbert, Amit Agarwal, Arvind Jain, and Natalia Sutin. 2010. An argument for increasing TCP's initial congestion window. ACM SIGCOMM Computer Communication Review 40, 3 (2010), 26--33.
[20]
Sally Floyd. 2004. Limited Slow-Start for TCP with Large Congestion Windows. RFC 3742. (March 2004).
[21]
Scott Fluhrer, David McGrew, Panos Kampanakis, and Valery Smyslov. 2019. Postquantum Preshared Keys for IKEv2. Internet-Draft draft-ietf-ipsecme-qr-ikev2-08. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-08 Work in Progress.
[22]
Oliver Gasser, Ralph Holz, and Georg Carle. 2014. A deeper understanding of SSH: Results from Internet-wide scans. In 2014 IEEE Network Operations and Management Symposium (NOMS). IEEE, 1--9.
[23]
Alessandro Ghedini and Victor Vasiliev. 2020. TLS Certificate Compression. Internet-Draft draft-ietf-tls-certificate-compression-10. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-ietf-tls-certificate-compression-10 Work in Progress.
[24]
Google. 2020. Google Transparency Report - HTTPS encryption on the web. https://transparencyreport.google.com/https/overview. (2020). Web page. Accessed 2020-06-19.
[25]
Paul E. Hoffman. 2002. SMTP Service Extension for Secure SMTP over Transport Layer Security. RFC 3207. (Feb. 2002).
[26]
Paul E. Hoffman. 2019. The Transition from Classical to Post-Quantum Cryptography. Internet-Draft draft-hoffman-c2pq-05. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-hoffman-c2pq-05 Work in Progress.
[27]
Andreas Hülsing, Joost Rijneveld, John M Schanck, and Peter Schwabe. 2017. Ntru-hrss-kem. NIST submissions (2017).
[28]
Panos Kampanakis and Dimitrios Sikeridis. 2019. Two Post-Quantum Signature Use-cases: Non-issues, Challenges and Potential Solutions. Technical Report. Cryptology ePrint Archive, Report 2019/1276, 2019. https://eprint.iacr.org/2019/1276.pdf.
[29]
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. Cryptology ePrint Archive, Report 2019/844. (2019). https://eprint.iacr.org/2019/844.
[30]
Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G Paterson, Narseo Vallina-Rodriguez, and Juan Caballero. 2018. Coming of age: A longitudinal study of tls deployment. In Proceedings of the Internet Measurement Conference 2018. ACM, 415--428.
[31]
Kris Kwiatkowski. 2019. Towards Post-Quantum Cryptography in TLS. (2019). https://blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/
[32]
Kris Kwiatkowski and Luke Valenta. 2019. The TLS Post-Quantum Experiment. (2019). https://blog.cloudflare.com/the-tls-post-quantum-experiment/.
[33]
Adam Langley. 2016. CECPQ1 results. (2016). https://www.imperialviolet.org/2016/11/28/cecpq1.html
[34]
Adam Langley. 2018. CECPQ2. (2018). https://www.imperialviolet.org/2018/12/12/cecpq2.html
[35]
Chris M. Lonvick and Tatu Ylonen. 2006. The Secure Shell (SSH) Authentication Protocol. RFC 4252. (Jan. 2006).
[36]
Chris M. Lonvick and Tatu Ylonen. 2006. The Secure Shell (SSH) Connection Protocol. RFC 4254. (Jan. 2006).
[37]
Chris M. Lonvick and Tatu Ylonen. 2006. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253. (Jan. 2006).
[38]
Kathleen Moriarty, Burt Kaliski, Jakob Jonsson, and Andreas Rusch. 2016. PKCS# 1: RSA cryptography specifications version 2.2. Internet Engineering Task Force, Request for Comments 8017 (2016).
[39]
Mozilla. 2018. Mozilla Telemetry Portal - Measurement Dashboard - HTTP_PAGE_TLS_HANDSHAKE distribution for Firefox Desktop. https://telemetry.mozilla.org/new-pipeline/dist.html. (2018). Beta 68/69, any OS, any architecture, any process. Web page. Accessed 2019-21-08.
[40]
David Naylor, Alessandro Finamore, Ilias Leontiadis, Yan Grunenberger, Marco Mellia, Maurizio Munafò, Konstantina Papagiannaki, and Peter Steenkiste. 2014. The cost of the S in HTTPS. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies. ACM, 133--140.
[41]
Hamid Nejatollahi, Nikil Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, and Rosario Cammarota. 2019. Post-Quantum Lattice-Based Cryptography Implementations: A Survey. ACM Comput. Surv. 51, 6, Article 129 (Jan. 2019), 41 pages.
[42]
NIST. 2020. Post-Quantum Cryptography Round 2 Submissions. (2020). https://csrc.nist.gov/Projects/post-quantum-cryptography/round-2-submissions.
[43]
National Institute of Standards and Technology. 2002. Specification for the Secure Hash Standard. Federal Information Professing Standards (FIPS) 180-2. https://csrc.nist.gov/CSRC/media/Publications/fips/180/2/archive/2002-08-01/documents/fips180-2.pdf. (2002).
[44]
Christian Paquin, Douglas Stebila, and Goutam Tamvada. 2020. Benchmarking post-quantum cryptography in tls. In International Conference on Post-Quantum Cryptography. Springer, 72--91.
[45]
OQS Project. 2020. liboqs. https://github.com/open-quantum-safe/liboqs. (2020). Web page. Accessed 2020-02-06.
[46]
OQS Project. 2020. OQS OpenSSH. https://github.com/open-quantum-safe/openssh. (2020). Web page. Accessed 2020-02-06.
[47]
OQS Project. 2020. OQS OpenSSL. https://github.com/open-quantum-safe/openssl. (2020). Web page. Accessed 2020-02-06.
[48]
PQClean Project. 2019. PQClean. https://github.com/PQClean/PQClean. (2019). Web page. Accessed 2019-02-09.
[49]
Abbas Razaghpanah, Arian Akhavan Niaki, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Johanna Amann, and Phillipa Gill. 2017. Studying TLS usage in Android apps. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies. 350--362.
[50]
Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. (Aug. 2018).
[51]
Eric Rescorla, Richard Barnes, and Hannes Tschofenig. 2020. Compact TLS 1.3. Internet-Draft draft-rescorla-tls-ctls-04. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-rescorla-tls-ctls-04 Work in Progress.
[52]
Jan Rüth, Christian Bormann, and Oliver Hohlfeld. 2017. Large-scale scanning of TCP's initial window. In Proceedings of the 2017 Internet Measurement Conference. 304--310.
[53]
Jan Rüth and Oliver Hohlfeld. 2018. Demystifying TCP initial window configurations of content distribution networks. In 2018 Network Traffic Measurement and Analysis Conference (TMA). IEEE, 1--8.
[54]
Markku-Juhani O Saarinen. 2020. Mobile energy requirements of the upcoming NIST post-quantum cryptography standards. In 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). IEEE, 23--30.
[55]
SHODAN. 2019. HTTPS (443) Overview. (July 2019). https://www.shodan.io/report/nWlAWhKG.
[56]
Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. on Computing 26, 5 (1997), 1484--1509.
[57]
Dimitrios Sikeridis, Panos Kampanakis, and Michael Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. In Network and Distributed Systems Security (NDSS) Symposium 2020 23-26 February 2020, San Diego, CA, USA. The Internet Society.
[58]
Dimitrios Sikeridis, Ioannis Papapanagiotou, Bhaskar Prasad Rimal, and Michael Devetsikiotis. 2017. A Comparative taxonomy and survey of public cloud infrastructure vendors. arXiv preprint arXiv:1710.01476 (2017).
[59]
Douglas Stebila and Michele Mosca. 2016. Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. Cryptology ePrint Archive, Report 2016/1017. (2016). https://eprint.iacr.org/2016/1017.
[60]
Douglas Steblia, Scott Fluhrer, and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-stebila-tls-hybrid-design-01 Work in Progress.
[61]
Douglas Steblia, Scott Fluhrer, and Shay Gueron. 2019. Design issues for hybrid key exchange in TLS 1.3. Internet-Draft draft-stebila-tls-hybrid-design-01. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-stebila-tls-hybrid-design-01 Work in Progress.
[62]
Nick Sullivan. 2014. ECDSA: The digital signature algorithm of a better internet. https://blog.cloudflare.com/ecdsa-the-digital-signature-algorithm-of-a-better-internet/. CloudFlare (2014).
[63]
Martin Thomson. 2019. Suppressing Intermediate Certificates in TLS. Internet-Draft draft-thomson-tls-sic-00. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-thomson-tls-sic-00 Work in Progress.
[64]
Luke Valenta, Nick Sullivan, Antonio Sanso, and Nadia Heninger. 2018. In search of CurveSwap: Measuring elliptic curve implementations in the wild. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 384--398.
[65]
Peter E. Yee. 2013. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 6818. (Jan. 2013).

Cited By

View all
  • (2024)A Comprehensive Survey on Post-Quantum TLSIACR Communications in Cryptology10.62056/ahee0iucOnline publication date: 8-Jul-2024
  • (2024)Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based EncryptionSensors10.3390/s2422730024:22(7300)Online publication date: 15-Nov-2024
  • (2024)Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMANAVIGATION: Journal of the Institute of Navigation10.33012/navi.64871:2(navi.648)Online publication date: 31-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CoNEXT '20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies
November 2020
585 pages
ISBN:9781450379489
DOI:10.1145/3386367
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 November 2020

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Short-paper

Conference

CoNEXT '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 198 of 789 submissions, 25%

Upcoming Conference

CoNEXT '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)252
  • Downloads (Last 6 weeks)28
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Comprehensive Survey on Post-Quantum TLSIACR Communications in Cryptology10.62056/ahee0iucOnline publication date: 8-Jul-2024
  • (2024)Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based EncryptionSensors10.3390/s2422730024:22(7300)Online publication date: 15-Nov-2024
  • (2024)Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMANAVIGATION: Journal of the Institute of Navigation10.33012/navi.64871:2(navi.648)Online publication date: 31-May-2024
  • (2024)Privacy Implications of AMQ-Based PQ TLS AuthenticationProceedings of the 20th International Conference on emerging Networking EXperiments and Technologies10.1145/3680121.3697813(65-72)Online publication date: 9-Dec-2024
  • (2024)A Deep Retrieval Model for Revit Software Database Based on Keyword Mining Algorithm2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00019(29-34)Online publication date: 18-Apr-2024
  • (2024)Securing Post-Quantum DNSSEC Against Fragmentation Mis-Association ThreatICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622607(97-102)Online publication date: 9-Jun-2024
  • (2024)In-line rate encrypted links using pre-shared post-quantum keys and DPUsScientific Reports10.1038/s41598-024-71861-x14:1Online publication date: 11-Sep-2024
  • (2024)Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEMFuture Generation Computer Systems10.1016/j.future.2024.107634(107634)Online publication date: Nov-2024
  • (2024)Quantum-resistant Transport Layer SecurityComputer Communications10.1016/j.comcom.2023.11.010213:C(345-358)Online publication date: 1-Jan-2024
  • (2024)Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and AssessmentComputer Security – ESORICS 202410.1007/978-3-031-70890-9_7(123-143)Online publication date: 16-Sep-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media