Supporting Future of PQC

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

October 2023

Perspective
EXPERT INSIGHTS ON A TIMELY POLICY ISSUE

ALVIN MOON, MICHAEL J. D. VERMEER

Supporting the Future


Effectiveness of Post-Quantum
Cryptography

C
ryptography is the study of methods of secure communication, and its
applications are ubiquitous in everyday life. Results from cryptography nat-
urally enter policy discussions through issues of national defense. Despite
its prevalence and importance, modern cryptography can be difficult for
general audiences to understand because it is deeply rooted in technical ideas from
theoretical and applied sciences.
The convergence of highly technical topics from cryptography with important
policy objectives, such as cybersecurity, creates a need to understand recent devel-
opments in cryptography at a granular level. The National Institute of Standards
and Technology (NIST) has predicted that advancements in quantum computing
will threaten certain communication technologies by overcoming modern protec-
tions against eavesdropping and unwanted viewing of secured messages (L. Chen
et al., 2016). Determining the scope and severity of the threat is a problem for a
broad audience of stakeholders.

C O R P O R AT I O N
The goal of this Perspective is to provide a focused anyone who knew the amount of shift could easily decrypt
view of the search for quantum-resistant cryptographic the message (Hoffstein, Pipher, and Silverman, 2008). The
methods. We explain different avenues for securing com- shift is an example of a key, or information that is used to
munications from quantum attacks and argue that crypto- protect and recover messages.
graphic research in the quantum era will benefit from open The discovery of public-key cryptography (PKC) marks
access to results. We conclude by identifying activities that a significant milestone in the development of cryptography
policymakers can consider to positively influence the out- because it introduced a new paradigm for securely send-
come of the pending post-quantum cryptography (PQC) ing information. The concept was first defined in a paper
migration. by Whitfield Diffie and Martin Hellman in 1976, although
it was discovered independently around the same time by
James Ellis in 1969 and Ralph Merkle in 1974.1 The char-
Quantum Computing’s Near-Term acterizing feature of PKC is the use of public and private
Effects on Cryptography keys. In its simplest form, a public-key scheme specifies
how a user’s public and private keys are combined to allow
Public-Key Cryptography
anyone in possession of the public key to securely send
For most of history, cryptographic methods depended on messages to the user. Unlike prior cryptographic schemes,
prearranged, shared secrets for their security. The famous PKC does not require a secure communication medium—
Caesar cipher was used to encrypt messages by shifting public keys and messages can be exchanged, for example,
letters in words by a uniform distance in the alphabet, and over an internet connection. When properly designed,
PKC methods are broadly resistant to modern computer
analysis. In practice, distinct parties maintain their own
Abbreviations
private and public keys, and the resulting system of keys
BIKE Bit Flipping Key Encapsulation allows each user to securely authenticate identities and
FDH Full Domain Hash establish secure channels of communication.
HSRD RAND Homeland Security Research Division
In a PKC scheme, the method of combining public
LWE learning with errors
and private keys determines its theoretical level of secu-
NIST National Institute of Standards and Technology
NSA National Security Agency rity. Ideally, the method is designed to make decryption
PKC public-key cryptography of encrypted messages infeasible without the private key.
PQC post-quantum cryptography Most modern PKC methods are based on two mathemati-
PSS Probabilistic Signature Scheme cal procedures: the factorization of integers, and the com-
SIKE Supersingular Isogeny Key Encapsulation putation of an object called the discrete logarithm. In cryp-
TLS transport layer security tography, these procedures are often posed as problems.
The former procedure challenges a would-be attacker to

2
find an algorithm (i.e., instructions for a computer) that, on an advanced quantum computer (Shor, 1994). In the
given any whole number, determines the complete list of its literature, both solutions are referred to as Shor’s algorithm.
smallest factors.2 A method based on factorization would Although Shor’s discoveries do not threaten all encryption
convert the difficulty of solving the factorization problem methods, they do threaten PKC, and engineering progress
into difficulty of decrypting messages without prior knowl- in creating advanced quantum computers has spurred a
edge of the private key.3 complementary effort to create quantum-resistant commu-
nication systems.
These efforts fall into two categories. Quantum cryp-
The Need for Post-Quantum Cryptography
tography uses quantum physics to implement crypto-
Quantum computers are theoretical devices that lever- graphic schemes. Recent years have seen breakthroughs in
age quantum mechanical properties of matter to accom- quantum cryptography, such as the realization of small-
plish computing tasks. Since they were first proposed in scale, device-independent quantum key–distribution sys-
a thought experiment about simulating physical systems tems (Liu et al., 2022; Nadlinger et al., 2022; Zhang et al.,
(Feynman, 1982), quantum computers have become a 2022) and first steps toward large-scale quantum networks
focal point of intense research. Researchers at the National (Y. Chen et al., 2021). However, quantum cryptographic
Academies of Sciences, Engineering, and Medicine (Com- methods are experimental and require specialized infra-
mittee on Technical Assessment of the Feasibility and structure to implement, and their security in real-life appli-
Implications of Quantum Computing, 2019) predicted cations is untested. Additionally, as of 2020, the National
that the successful realization of useful quantum comput- Security Agency (NSA) did not recommend quantum
ers would occur no sooner than 2026; a 2022 report by the cryptography as a protection for national security systems
Global Risk Institute (Mosca and Piani, 2022) states that against quantum computing (NSA, 2020). Similar positions
the development of a useful quantum computer by 2026 is have been stated by the United Kingdom’s National Cyber
very unlikely.4 Despite this, quantum computing research- Security Centre (2020) and France’s Agence nationale de la
ers have already identified applications that have the poten- sécurité des systèmes d’information (undated). For these
tial for revolutionary breakthroughs in both basic and and other reasons, it is unlikely that quantum cryptogra-
applied sciences. phy will see widespread use in the near future.
Although current computing technology cannot effi- In contrast, PQC, 6 the topic of this Perspective, is
ciently solve either the factorization problem or the discrete the study of cryptographic methods that can be imple-
logarithm problem, it is widely believed that advanced mented on current computing systems. PQC algorithms
quantum computers will not have this limitation.5 In 1994, use mathematical protections to safeguard against both
Peter Shor constructed novel solutions to both factorization quantum and nonquantum computing threats. Generally,
and discrete logarithm problems and gave mathematical two important activities of PQC are finding problems that
proof that these solutions can run as efficient algorithms cannot be solved efficiently, even with the aid of quantum

3
computers, and designing cryptographic algorithms that caveat is that this Perspective is far from comprehensive—
exploit these problems to create quantum-resistant com- we do not, for example, discuss the important issues of
munication channels. cost, algorithm performance, and intellectual property,
The present goal of PQC is to enable a transition away which are significant criteria for NIST’s ongoing effort
from vulnerable public-key methods toward public-key to create PQC standards. (Computer Security Resource
methods that cannot be broken easily by quantum or Center, 2016).
nonquantum algorithms. Replacing vulnerable computer
systems to protect information against quantum attacks
Factor 1: Choice of Methods
is a strategic objective in the U.S. National Cybersecurity
Strategy (White House, 2023), and preparations for this PQC algorithms are characterized by the methods they
PQC migration have already begun. Notably, in 2016, NIST employ to encrypt messages. Knowing the mathematical
opened a public call for quantum-resistant algorithms basis of a PQC algorithm is important because it largely
to begin developing standards for PQC. Part of the stan- determines the theoretical security of the algorithm. Cur-
dardization process is screening candidates for security rently, there are several distinct proposals for securing
and performance, with competitive candidates advanc- PQC algorithms. However, the NIST evaluation results
ing through rounds of evaluations (Computer Security show a preference for a single category of algorithms whose
Resource Center, 2016). At the time of this writing in the security is based on mathematical objects called lattices.7
summer of 2023, NIST has selected four candidates for In the future, selective pressures, such as research prefer-
standardization from its third round of evaluations and ences or successful attacks on developing security systems,
promoted several of the remaining candidates for an ongo- might reduce the number of distinct methods in practice.
ing fourth round. Whether this outcome would have a significant effect on
the security of communication systems is an important
open question for policymakers and industry stakeholders
Two Influential Factors in Algorithm to consider.
Development for Post-Quantum Most PQC public-key algorithms base their security on
Computing one or more of the following types of problems (Bernstein,
Buchmann, and Dahmén, 2009):
In this section, we highlight two factors that influence PQC
algorithm development: choice of methods and availability • lattice problems
of theoretical security guarantees. We use the two factors • code-based problems
highlighted here to motivate discussions in the next sec- • multivariate polynomial root-finding
tion about transparent algorithm development and cryp- • hash-based problems
tographically agile implementation of PQC. An important • elliptic-curve isogenies.

4
For example, an algorithm that uses lattice problems is Classification of National Institute of
a lattice-based algorithm. Two algorithms that use methods Standards and Technology Post-Quantum
from the same family of problems can still have very differ- Cryptography Standardization Third-Round
ent behaviors with respect to security and functionality. Candidates
Public-key PQC algorithms are one of many types of Problem Type Candidate
building blocks for a cryptosystem (a collection of algo- Lattice problem Kyber,a Dilithium,a NTRU, NTRU Prime,
rithms whose combined use establishes a technique for Saber, Falcon,a FrodoKEM

encrypting and reading messages). The different methods Code-based problem Classic McEliece, BIKE, Hamming
used by a cryptosystem describe how the system achieves Quasi-Cyclic (HQC)

its security. A cryptographic protocol specifies how to Multivariate polynomial Rainbow, Great Multivariate Short
root-finding Signature (GeMSS)
implement cryptosystems and other algorithms to create
secure channels for communication. In the next section, we Hash-based problem SPHINCS+a
discuss an important example of a cryptographic protocol Elliptic-curve isogeny SIKE
called the transport layer security (TLS) protocol, which
Other Picnic
uses both public keys and other methods to protect internet
NOTES: BIKE = Bit Flipping Key Encapsulation; SIKE = Supersingular Isogeny
communications. Key Encapsulation.
As of this writing in the summer of 2023, methods a Selected in 2022 for standardization at the end of the third round.

from each of the five types of problems listed above are


active areas of PQC research, but we found an emerging identified as a lattice-based algorithm through a sequence
trend toward lattice-based methods. In the table are our of research papers beginning with Oded Regev’s pioneering
findings from technical documents available on the NIST work on LWE (Regev, 2009).
PQC website to classify the third-round candidates by Some of NIST’s third-round candidate algorithms
method and identify examples of PQC algorithms in each were later found to be flawed. Castryck and Decru (2023)
class (Alagic et al., 2022). NIST planned to hold another demonstrated an attack on the third-round candidate
call for proposals, ending in June 2023, for digital signa- SIKE. Their result is notable partly because it relies on an
ture algorithms, with an emphasis on methods that are not algebro-geometric theorem by Kani which had been proven
lattice-based (Computer Security Resource Center, 2022). without cryptographic motivations (Kani, 1997). Rainbow,
Classification can be a nontrivial task. An example another third-round finalist, was broken by Beullens in
that illustrates this is Kyber, one of the algorithms that 2022. This attack (Beullens, 2022) is notable because Rain-
NIST chose for standardization in 2022. The security of the bow’s security had been investigated in a series of attacks
Kyber algorithm is backed by a family of problems known and improvements, from its introduction in 2005 to its last
as learning with errors (LWE) (Avanzi et al., 2021).8 How- update in 2020, which claimed to present a proof of secu-
ever, to fit in the classification of our table, it was ultimately

5
rity for the submitted version of Rainbow (Alagic et al., a realistic attack on the target cryptosystem would be dif-
2022; Ding and Schmidt, 2005). ficult, if not impossible, to find.
It is uncertain what effect these attacks will have on Reductions in PQC algorithms are an active topic of
the future development of isogeny-based and multivariate- research. Tracking developments in this area is important
based algorithms. For example, Castryck and Decru (2023) even outside the context of cryptographic analysis because
concluded that SIKE appears fully broken and unsuitable reduction results shape research priorities and preferences
for secure use. We can imagine that SIKE’s failure could for algorithms. One view of this process is that reductions
discourage further development or adoption of isogeny- define a constructive paradigm for PQC algorithm devel-
based algorithms out of concern that isogeny-based prob- opment by giving a sense of what a “natural” cryptosystem
lems would be vulnerable to similar attacks, regardless of is and setting the bar for what cryptographic constructions
whether the Castryck–Decru result can be generalized to should hope to achieve (Damgård, 2007).10
apply to a broader scope of algorithms. On one hand, the results of reductions are highly tech-
nical and abstract. An application of reduction must be
scrutinized at the rigorous level of proofs to make sure it is
Factor 2: Availability of Theoretical Security
correctly used, and even then, its impact can be qualified.
Guarantees Alkadri et al. (2017) observed that reductions had had less
Lattice-based PQC algorithms have a special role in the of a practical impact on security analysis for lattice-based
search for quantum-resistant schemes because of the algorithms than parameter optimization (i.e., the empirical
cryptographic community’s confidence in certain lattice- selection of algorithm settings that offer security against
based algorithms’ qualitative security guarantees against best-known methods of attack) had.
attack. The guarantees are based on a form of mathemati- On the other hand, a qualitative security guarantee is
cal analysis called reduction.9 These proofs give qualita- valuable partly because it implies a robust level of security
tive metrics of security for the constructed algorithms, that can be tested through analysis and trial. For example,
allowing coarse-grain comparisons between them. They the discovery of particularly strong reductions for lattice
also provide standards to which the algorithms can be problems have put a spotlight on lattice research, and this
fine-tuned, adding a necessary, quantitative measure of research has led to “credible estimates” of the security of
security. Plainly put, a reduction is a relationship between lattice-based cryptosystems (Computer Security Resource
two problems in which an assumed solution of one prob- Center, 2022).
lem implies the existence of a solution to the other. In cryp- For the remainder of this discussion, we continue our
tography, one use of a reduction is to derive constraints on description of lattice-based algorithms by describing recent
the assumed solution, which plays the role of the would-be developments in reductions and security guarantees. Our
attack on a cryptosystem. Ideally, a reduction reveals that goal is to explain why certain lattice-based algorithms are

6
thought to be secure and why reductions will continue to The literature on tightness gaps for reductions in
be an active research topic for PQC in the future. lattice-based algorithms reflects the current state of uncer-
Regev’s work on LWE supplied a proof that efficient tainty. Koblitz et al. (2022) presented an analysis of the
solutions of certain LWE problems can be converted into Lyubashevsky–Peikert–Regev reduction, claiming that its
relatively efficient solutions for certain lattice problems loose tightness gap and other issues nullify any derived
known generally as shortest-vector problems (SVPs). Two security guarantee. Such claims argue directly against
types of shortest-vector problems, gap SVP (GapSVP) analyses that conclude that cryptosystems based on for-
and shortest independent vector problem (SIVP), reduce mulations of LWE, such as Peikert (2009) and (Stehlé and
to LWE (Regev, 2010);11 because there is evidence that Steinfeld (2011), are provably secure up to the difficulty of
instances of GapSVP and SIVP are difficult to solve standard lattice problems.
(Peikert, 2016), efficient solutions of the highlighted LWE Historically, concerns about tightness have been well-
problems are likely difficult to find. This implies that suc- founded, and resolving these concerns has led to improved
cessful attacks on LWE are accordingly difficult to con- security guarantees. One example comes from methods
struct. The reduction that underlies the Kyber algorithm to securely send and authenticate a digital signature (data
comes from work by Langlois and Stehlé (2015) and earlier that certify a message with information about the identity
work by Lyubashevsky, Peikert, and Regev (2013). of the sender and intactness of the message). In the 1990s,
Although reductions of lattice problems are generally Bellare and Rogaway introduced two closely related algo-
accepted as theoretically valid, recent works to quantify the rithms, the Full Domain Hash (FDH) and the Probabilistic
real-life applicability of reductions in lattice-based schemes Signature Scheme (PSS), which have been widely used to
have been controversial. One interesting area of investiga- implement digital signature schemes. In 1996, Bellare and
tion is so-called tightness gaps in reduction. To illustrate Rogaway proved security guarantees for FDH and PSS,
the concern, we provide this example. Suppose that there converting the difficulty of integer factorization into upper
are two problems, problems A and B, and A reduces to B. bounds on the probability that either scheme can be broken
Given a solution S to problem B, the reduction produces in a given amount of time (Bellare and Rogaway, 1996). As
a solution S' to problem A. If the cost to implement solu- Bellare and Rogaway acknowledged in their 1996 paper,
tion S', quantified in terms of maximal computation time their reduction for FDH was not tight, and their open
and probability of success, is comparable to the cost to question about the security of FDH instigated a chain of
implement S, we say that the reduction is tight. Otherwise, research that has clarified comparisons between FDH and
the relative difficulty of implementing S' might not trans- PSS and improved the security of digital signature schemes
late into a realistic constraint on the difficulty of imple- that rely on them.
menting S. In other words, a sufficiently large tightness gap Last, reduction arguments depend on a theoretical
might still allow for an efficient solution to problem B. understanding of the difficulty of the reduced problem.
The study of computational difficulty is called complexity

7
theory, and the most famous open problem from com- the third-round candidates were developed by teams affili-
plexity theory, known as P versus NP, has been unsolved ated with universities.
for more than 50 years. Its answer would have direct and Like the results of research, the specifications of PQC
possibly negative consequences for security analyses, such algorithms are often published and distributed widely; one
as reduction; efforts to resolve P versus NP will certainly of the minimal acceptability requirements for the NIST
continue independently of the status of PQC. PQC standardization call was public disclosure of algo-
rithms, allowing reasonable public review of any candidate.
One important reason for wide distribution is the principle
Supporting the Future of open cryptography—that transparent development of
Effectiveness of Post-Quantum algorithms is more effective in creating secure crypto-
Cryptography systems than development done in secret is. The crypto-
graphic community is more willing to adopt methods that
We argue that transparent development contributes to the
have been transparently vetted because, otherwise, algo-
security of PQC cryptosystems. Trends in research and
rithms are black boxes and their security is unverifiable.
literature point to PQC algorithms being implemented in
For example, initial concerns about the opaque devel-
the near future, which suggests an opportunity to create
opment of NIST standards for a random number generator
cryptographically agile PQC protocols. In this section, we
called Dual_EC_DRBG included suggestions of insecurity
consider future PQC algorithm development and discuss
(Brown and Gjøsteen, 2007) and claims of intentionally
activities that support the end goals of PQC migration.
placed weak points in algorithm design (Shumow and
Ferguson, 2007). The algorithm was widely shunned by the
Benefits of Transparent Development in cryptographic community because the algorithm’s security
Post-Quantum Cryptography was not publicly verifiable (Schneier, 2007). By the time
NIST removed Dual_EC_DRBG from its standards in
At its present state, cryptographic activity around PQC 2014, it was clear that NSA had obscured the development
algorithms shares similarities with basic and applied of Dual_EC_DRBG and used the secrecy to deliberately
research. The methods of PQC are based in mathemat- introduce weaknesses—the agency had planned to use
ics, and a notable part of the activity aims to produce new these weaknesses to bypass encryption methods (Kostyuk
theoretical results. Activity in specific research areas, such and Landau, 2022). Kostyuk and Landau observed that
as reduction and tightness analysis, and in broad areas, NIST, which had historically played a prominent and inter-
such as algebraic geometry, will continue to produce the national role in standardizing cryptographic algorithms,
cryptographic ability and diversity in algorithms necessary retained the trust of the cryptographic community through
to mitigate risks from novel attacks and technologies. The this incident partly because of its long-standing practice of
similarity is also reflected in the places of activity. All 15 of transparent development.

8
Without transparent development and open access to
PQC research, there is a risk of using technology that
has not been sufficiently vetted to protect the information
infrastructure.
Even the well-intentioned idea of withholding informa- encrypted messages in cases of crime or threat to national
tion about vulnerabilities to avoid damage to cybersecurity, security (Markoff, 1993). The design of the crypto­system
as found in Bellovin’s (1995) delayed analysis of weaknesses and its implementation on Clipper chips were, for the
in the early internet’s domain name system,12 has fallen out most part, classified. When NSA made some aspects of
of favor and been replaced by principles of open analysis the eavesdropping algorithm available to the public, a
(Bellovin and Bush, 2002). researcher at AT&T Bell Laboratories quickly demon-
Despite high-profile cases, such as Dual_EC_DRBG, strated flaws that led some to question the functionality of
it is difficult to argue definitively that openly developed the feature (Blaze, 1994). The cryptosystem was ultimately
cryptosystems generally fare better than secretly developed abandoned after subsequent research showed that the
cryptosystems because the latter are, by design, inscrutable. proposed eavesdropping algorithm could “jeopardize the
For example, there is no way to know from public infor- proper operation, underlying confidentiality, and ultimate
mation whether the classified suite A set of cryptographic security of encryption systems” (Abelson et al., 1997, p. 10).
algorithms maintained by NSA for government use (Com- Presently, PQC development involves cryptographic
mittee on National Security Systems, 2010) is any stronger novelty. Lattice-based algorithms have trended toward
or weaker than its publicly available suite. mathematical sophistication (e.g., choosing LWE formula-
However, we conjecture that the process of open devel- tions that involve objects with more structure than origi-
opment is more robust than secret development when the nally assumed in Regev’s seminal paper). And reductions
methods involved are relatively new or untested. To sup- and tightness arguments are, in the end, mathematical
port this conjecture, we note the example of the Clipper proofs that are attempting to push security boundaries
chip. In 1993, the U.S. federal government announced a beyond what is already known. The standard for verifica-
plan to widely implement a deliberately weakened crypto­ tion of mathematical results is peer review, which requires
system, which would allow a novel eavesdropping fea- open access to details. Without transparent development
ture: It would permit federal law enforcement to access and open access to PQC research, there is a risk of using

9
technology that has not been sufficiently vetted to protect begun even before NIST announced its first selections for
the information infrastructure. standardization in 2022. In 2019, technology companies
Cloudflare and Google tested implementations of SIKE and
a lattice-based algorithm called HRSS, measuring perfor-
Implementation of Post-Quantum
mance of roughly 10 million uses of an experimental TLS
Cryptography in Communication Protocols protocol over 53 days (Kwiatkowski and Valenta, 2019). In
Unlike quantum cryptography, PQC produces algorithms 2019, Amazon Web Services, a cloud computing service,
for existing computer systems. A combination of confi- created a TLS protocol that used SIKE and BIKE (Hopkins,
dence in theoretical security guarantees and progress in 2019) and later Kyber (Weibel, 2023); a test of the latter
NIST’s PQC standardization process has already prompted implementation measured performance over 2,000 TLS
several industry experiments with implementation. These handshakes between Amazon Web Services computing
experiments provide a glimpse at how industry stakehold- systems.
ers might integrate PQC algorithms into ordinary use There is a realistic possibility that, as NIST’s standard-
and handle future migratory pressure. Notable examples ization process concludes and internet standards respond
involve the TLS protocol, which is a cornerstone of modern to the introduction of mature PQC algorithms, there will
secure messaging and data transmission for the internet. be an increase in the use of hybrid TLS protocols that com-
The TLS protocol has a wide variety of applications bine post-quantum and classical methods, creating a wide
centered on securing internet communications, and it surface for algorithmic variation. However, important tech-
is commonly used to negotiate preliminary agreements nical questions about the transition, including concerns
between users that authenticate communicating parties about computational performance (Schwabe, Stebila, and
and share cryptographic information before encrypted Wiggers, 2021) and software incompatibilities (Cimpanu,
messages can be securely exchanged. This preliminary 2021), have not been resolved and stand in the way of, for
step is called the handshake, and, although the TLS pro- example, a capable post-quantum TLS protocol.
tocol offers several methods to shake hands, the majority
of these methods are based on PKC and will need to be
Addressing a Problem of Cryptographic
replaced during PQC migration. The redundance of hand-
shake methods reflects a modular design philosophy that
Agility
emphasizes the ability to slot new public-key methods into Implementations of PQC should be able to respond to
the protocol without the need for extensive revisions to the sudden and effective breaks of algorithms in their crypto-
protocol itself (Dierks and Rescorla, 2008). graphic suites, especially during the early deployments of
TLS protocols that incorporate PQC algorithms are PQC algorithms and the uncertain years that will surround
already in development today (Celi et al., 2021). And indus- the creation of the first advanced quantum computer.
try experiments with post-quantum TLS protocols had Efforts to preemptively prepare for certain events, such as

10
the attack on SIKE, address important concerns related This outcome is potentially problematic. In the future,
to cryptographic agility. One important aspect of crypto- a break in a PQC cryptosystem comparable to Shor’s algo-
graphic agility is the ability to introduce, maintain, replace, rithm might not be accompanied by decades of preparatory
and combine use of algorithms without significant changes time—much like happened with the comparatively late and
to the overall infrastructure of the information system sudden break of SIKE. The only mitigating factor in this
(Barker, Polk, and Souppaya, 2021). case would be a diversity of cryptographic algorithms that
Identifying obstacles to cryptographic agility is impor- would allow infrastructure to quickly and effectively swap
tant for practical reasons. A cryptographically rigid pro- in an algorithm that could resist this hypothetical attack.
tocol that depends narrowly on one method, for example, The pending migration caused by Shor’s algorithm
would not be able to easily or quickly adapt to the discovery presents a unique opportunity to codify new mathemati-
of an efficient attack, thereby prolonging the time during cal frameworks, such as lattice-based cryptography, as the
which the attack could cause damage. foundations of post-quantum cryptosystems. To support
As we have shown with examples of TLS protocols, this goal, we identify the following impactful activities that
one obstacle is the technical difficulty of implementing can be affected at the level of policy:
PQC algorithms in an agile way. Besides implementation, • transparent development and standardization of
protocol agility is also constrained by the availability and PQC algorithms: Many relevant methods required
proper adoption of enough secure methods. Although the to develop secure PQC algorithms come from
recent need for PQC migration has raised interest in alter- applied and theoretical mathematics. These math-
native cryptosystems, it is unclear whether standardization ematical methods require peer review and cryp-
and adoption pressures will select only a few methods for tographic community input in order to offer both
use in the future. An overwhelming preference for one quantitative and qualitative security guarantees.
or two methods could preclude research and develop- Restrictions on open access of research or standards
ment for other methods, resulting in a limited availability could lead to improper use of mathematical results,
of mature PQC algorithms. Alternatively, many mature harming cryptographic security in the long run.
PQC algorithms might be available for use, but, in prac- • cryptographically agile implementation: As com-
tice, users might choose to deploy them in protocols in panies and other stakeholders implement the first
unvaried ways. As computer systems are built and updated PQC migrations in their communication systems,
around these conventions, protocols could become inflex- there is an opportunity to prioritize protocols that
ible through a process known as ossification (Vermeer and are cryptographically agile and to take advantage
Peet, 2020). In any case, the outcome would be a constraint of the present diversity of cryptographic frame-
on the ability of some protocols, such as TLS, to effectively works. Standards and requirements that emphasize
exchange insecure algorithms for secure ones. agile implementation would help prepare for future

11
migrations by reducing pressure to consolidate the Notes
available number of secure cryptosystems. 1 No publicly available document resulted from Ellis’s work.
Policies that encourage these activities above will 2More precisely known as prime factors. Learning all of the factors of a
support the future effectiveness of PQC by preparing for whole number requires knowing only its prime factors.
sudden and effective breaks of algorithms in cryptographic 3 See Boneh and Venkatesan (1998) for a discussion on the necessity of
suites. This technical responsiveness to unforeseen events solving the integer factorization problem to break the Rivest–Shamir–
Adleman algorithm.
is one of many capabilities that will determine PQC’s suc-
4 The Global Risk Institute authors concluded this through a survey
cess in creating a secure post-quantum environment for
of 46 quantum computing experts, finding that “most experts (25/46)
communication. With proper consideration of points like judged that the threat to current public-key cryptosystems in the next
the ones raised in this Perspective, PQC will pave the way 5 years is ‘<1% likely’” (Mosca and Piani, 2022, p. 26). For a full descrip-
for the safe adoption of revolutionary quantum computing tion of likelihoods, see Mosca and Piani, 2022.
technologies whenever they are deployed. 5 Although quantum algorithms are technically able to break widely
used PKC schemes, the energy cost of running algorithms on capable
hardware might limit the applicability of advanced quantum computers.
See Parker and Vermeer (2023) for a discussion of energy cost obstruc-
tions to breaking public-key encryption.
6 Also known as quantum-resistant cryptography.
7NSA expects to approve a selection of lattice-based algorithms from
NIST’s evaluations for use in national security systems (NSA, undated).
8 Not all lattice-based algorithms derive their security from LWE
problems. A notable example is the collection of lattice-based algo-
rithms which comprise the NTRU cryptosystem (Hoffstein, Pipher, and
Silverman, 1998). However, interest in provable security motivated the
creation of a variant of NTRU which can use a LWE problem to provide
a theoretical security guarantee—see Stehlé and Steinfeld (2011).
9 Not to be confused with the mathematical technique of lattice
reduction.
10 Damgård noted that “naturality” of a cryptosystem is inherently
subjective and states that the “only reasonable approach [to algorithm
design] is to construct cryptographic systems with the objective of being
able to give security reductions for them” (Damgård, 2007, p. 4).
11 Although we focus on LWE because of its relevance to our discussion
of Kyber, the study of reductions of lattice problems for cryptography
was initiated by Ajtai (1996).

12
12Bellovin delayed the publication of his 1995 report on early internet Bellovin, Steven M., “Using the Domain Name System for System Break-
weaknesses because he found a “serious vulnerability for which there Ins,” SSYM’95: Proceedings of the Fifth Conference on USENIX UNIX
was no feasible fix.” See the epilogue of Bellovin (1995). Security Symposium, Vol. 5, June 1995.
Bellovin, Steven Michael, and Randy Bush, “Security Through
Obscurity Considered Dangerous,” Internet Engineering Task Force,
internet draft, February 28, 2002.
References Bernstein, Daniel J., Johannes Buchmann, and Erik Dahmén, eds., Post-
Quantum Cryptography, Springer, 2009.
Abelson, Hal, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt
Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Beullens, Ward, “Breaking Rainbow Takes a Weekend on a Laptop,” in
Rivest, Jeffrey I. Schiller, and Bruce Schneier, “The Risks of Key Y. Dodis and T. Shrimpton, eds., Advances in Cryptology—CRYPTO
Recovery, Key Escrow, and Trusted Third-Party Encryption,” World 2022, Springer, Lecture Notes in Computer Science, Vol. 13508, 2022.
Wide Web Journal, Vol. 2, No. 3, 1997.
Blaze, Matt, “Protocol Failure in the Escrowed Encryption Standard,”
Agence national de la sécurité des systèmes d’information, “Should CCS ’94: Proceedings of the 2nd ACM Conference on Computer and
Quantum Key Distribution Be Used for Secure Communications?” Communications Security, Association for Computing Machinery,
webpage, undated. As of July 7, 2023: November 1994.
https://www.ssi.gouv.fr/publication/
should-quantum-key-distribution-be-used-for-secure-communications/ Boneh, Dan, and Ramarathnam Venkatesan, “Breaking RSA May Not
Be Equivalent to Factoring,” in K. Nyberg, ed., Advances in Cryptology:
Ajtai, M., “Generating Hard Instances of Lattice Problems (Extended EUROCRYPT’98, Lecture Notes in Computer Science, Vol. 1403, 1998.
Abstract),” Proceedings of the Twenty-Eighth Annual ACM Symposium
on Theory of Computing, Association for Computing Machinery, 1996. Brown, Daniel R. L., and Kristian Gjøsteen, “A Security Analysis of the
NIST SP 800-90 Elliptic Curve Random Number Generator,” Advances
Alagic, Gorjan, Daniel Apon, David Cooper, Quynh Dang, Thinh in Cryptology: CRYPTO 2007, Vol. 4622, 2007.
Dang, John Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl Miller, Dustin
Moody, Rene Peralta, Ray Perlner, Angela Robinson, and Daniel Smith- Castryck, Wouter, and Thomas Decru, “An Efficient Key Recovery
Tone, Status Report on the Third Round of the NIST Post-Quantum Attack on SIDH,” in C. Hazay and M. Stam, eds., Advances in
Cryptography Standardization Process, NIST IR 8413-upd1, July 2022. Cryptology: EUROCRYPT 2023, Springer, Lecture Notes in Computer
Science, Vol. 14008, 2023.
Alkadri, Nabil Alkeilani, Johannes Buchmann, Rachid El Bansarkhani,
and Juliane Krämer, A Framework to Select Parameters for Lattice-Based Celi, Sofía, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada,
Cryptography, Cryptology ePrint Archive, Paper 2017/615, 2017. Luke Valenta, Thom Wiggers, Bas Westerbaan, and Christopher A.
Wood, “Implementing and Measuring KEMTLS,” in Patrick Longa
Avanzi, Roberto, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, and Carla Ràfols, eds., Progress in Cryptology: LATINCRYPT 2021—7th
Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, International Conference on Cryptology and Information Security in
and Damien Stehlé, CRYSTALS-Kyber: Algorithm Specifications and Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings,
Supporting Documentation (Version 3.02), January 31, 2021. LNCS 12912, 2021.
Barker, William, W. Polk, and Murugiah Souppaya, “Getting Ready Chen, Lily, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta,
for Post-Quantum Cryptography: Exploring Challenges Associated Ray Perlner, and Daniel Smith-Tone, “Report on Post-Quantum
with Adopting and Using Post-Quantum Cryptographic Algorithms,” Cryptography,” Computer Security Resource Center, Information
National Institute of Standards and Technology, cybersecurity white Technology Laboratory, National Institute of Standards and Technology,
paper, April 28, 2021. U.S. Department of Commerce, NISTIR 8105, April 2016.
Bellare, Mihir, and Phillip Rogaway, “The Exact Security of Digital
Signatures: How to Sign with RSA and Rabin,” Advances in Cryptology:
Eurocrypt ’96, Vol. 1070, 1996.

13
Chen, Yu-Ao, Qiang Zhang, Teng-Yun Chen, Wen-Qi Cai, Sheng-Kai Ding, Jintai, and Dieter Schmidt, “Rainbow, a New Multivariable
Liao, Jun Zhang, Key Chen, Juan Yin, Ji-Gang Ren, Zhu Chen, Sheng- Polynomial Signature Scheme,” in J. Ioannidis, A. Keromytis, and
Long Han, Qing Yu, Ken Liang, Fei Zhou, Xiao Yuan, Mei-Sheng Zhao, M. Yung, eds., Applied Cryptography and Network Security, Springer,
Tian-Yin Wang, Xiao Jiang, Liang Zhang, Wei-Yue Liu, Yang Li, Qi Lecture Notes in Computer Science, Vol. 3531, 2005.
Shen, Yuan Cao, Chao-Yang Lu, Rong Shu, Jian-Yu Wang, Li Li, Nai-Le
Liu, Feihu Xu, Xiang-Bin Wang, Cheng-Zhi Peng, and Jian-Wei Pan, Feynman, Richard P., “Simulating Physics with Computers,”
“An Integrated Space-to-Ground Quantum Communication Network International Journal of Theoretical Physics, Vol. 21, No. 6–7, 1982.
over 4,600 Kilometres,” Nature, Vol. 589, January 14, 2021. Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman, “NTRU: A
Cimpanu, Catalin, “Google Pauses Quantum Security Feature in Ring-Based Public Key Cryptosystem,” in Joe P. Buhler, ed., Algorithmic
Chrome Because of Buggy Middleware,” The Record, August 31, 2021. Number Theory: Third International Symposium, ANTS-III, Portland,
Oregon, USA, June 21–25, 1998, Proceedings, Lecture Notes in Computer
Committee on National Security Systems, National Information Science, Vol. 1423, Springer, 1998.
Assurance (IA) Glossary, Instruction 4009, April 26, 2010.
Hoffstein, Jeffrey, Jill Catherine Pipher, and Joseph H. Silverman, An
Committee on Technical Assessment of the Feasibility and Implications Introduction to Mathematical Cryptography, Springer, 2008.
of Quantum Computing, Intelligence Community Studies Board,
Computer Science and Telecommunications Board, Division on Hopkins, Andrew, “Post-Quantum TLS Now Supported in AWS KMS,”
Engineering and Physical Science, National Academies of Sciences, AWS Security Blog, November 4, 2019. As of July 7, 2023:
Engineering, and Medicine, Quantum Computing: Progress and https://aws.amazon.com/blogs/security/
Prospects, National Academies Press, 2019. post-quantum-tls-now-supported-in-aws-kms/

Computer Security Resource Center, Information Technology Kani, Ernst, “The Number of Curves of Genus Two with Elliptic
Laboratory, National Institute of Standards and Technology, U.S. Differentials,” Journal für die reine undangewandte Mathematik,
Department of Commerce, “Submission Requirements and Evaluation Vol. 1997, No. 485, 1997.
Criteria for the Post-Quantum Cryptography Standardization Process,” Koblitz, Neal, Subhabrata Samajder, Palash Sarkar, and Subhadip
call for proposals, December 2016. Singha, “Concrete Analysis of Approximate Ideal–SIVP to Decision
Computer Security Resource Center, Information Technology Ring–LWE Reduction,” Advances in Mathematics of Communications,
Laboratory, National Institute of Standards and Technology, U.S. early access, October 2022.
Department of Commerce, “PQC Standardization Process: Announcing Kostyuk, Nadiya, and Susan Landau, “Dueling over Dual_EC_DRGB:
Four Candidates to Be Standardized, Plus Fourth Round Candidates,” The Consequences of Corrupting a Cryptographic Standardization
webpage, July 5, 2022. As of July 7, 2023: Process,” Harvard Law School National Security Journal, Vol. 13, June 7,
https://csrc.nist.gov/News/2022/ 2022.
pqc-candidates-to-be-standardized-and-round-4
Kwiatkowski, Kris, and Luke Valenta, “The TLS Post-Quantum
Damgård, Ivan, “A ‘Proof-Reading’ of Some Issues in Cryptography,” Experiment,” The Cloudflare Blog, October 30, 2019. As of July 7, 2023:
in L. Arge, C. Cachin, T. Jurdziński, and A. Tarlecki, eds., Automata, https://blog.cloudflare.com/the-tls-post-quantum-experiment/
Languages and Programming, Lecture Notes in Computer Science,
Vol. 4596, Springer, 2007. Langlois, Adeline, and Damien Stehlé, “Worst-Case to Average-Case
Reductions for Module Lattices,” Designs, Codes and Cryptography,
Dierks, T., and E. Rescorla, “The Transport Security Layer (TLS) Vol. 75, June 2015.
Protocol, Version 1.2,” Network Working Group, request for
comments 5246, August 2008. Liu, Wen-Zhao, Yu-Zhe Zhang, Yi-Zheng Zhen, Ming-Han Li, Yang
Liu, Jingyun Fan, Feihu Xu, Qiang Zhang, and Jian-Wei Pan, “Toward
Diffie, Whitfield, and Martin E. Hellman, “New Directions in a Photonic Demonstration of Device-Independent Quantum Key
Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, Distribution,” Physical Review Letters, Vol. 129, No. 5, July 29, 2022.
No. 6, November 1976.
Lyubashevsky, Vadim, Chris Peikert, and Oded Regev, “On Ideal
Lattices and Learning with Errors over Rings,” Journal of the ACM,
Vol. 60, No. 6, November 1, 2013.

14
Markoff, John, “Communications Plan Draws Mixed Reaction,” New Schneier, Bruce, “Did NSA Put a Secret Backdoor in New Encryption
York Times, April 17, 1993. Standard?” Wired Magazine, November 15, 2007.
Merkle, Ralph, “Project Proposal,” homework for Computer Science 244, Schwabe, Peter, Douglas Stebila, and Thom Wiggers, “More Efficient
Fall 1974. Post-Quantum KEMTLS with Pre-Distributed Public Keys,” in
E. Bertino, H. Shulman, and M. Waidner, eds., Computer Security:
Mosca, Michele, and Marco Piani, 2021 Quantum Threat Timeline ESORICS 2021, Lecture Notes in Computer Science, Vol. 12972, 2021.
Report, Global Risk Institute, January 24, 2022.
Shor, Peter W., “Algorithms for Quantum Computation: Discrete
Nadlinger, D. P., P. Drmota, B. C. Nichol, G. Araneda, D. Main, Logarithms and Factoring,” Proceedings 35th Annual Symposium on
R. Srinivas, D. M. Lucas, C. J. Ballance, K. Ivanov, E. Y.-Z. Tan, Foundations of Computer Science, 1994.
P. Sekatski, R. L. Urbanke, R. Renner, N. Sangouard, and J.-D. Bancal,
“Experimental Quantum Key Distribution Certified by Bell’s Theorem,” Shor, Peter W., “Polynomial-Time Algorithms for Prime Factorization
Nature, Vol. 607, July 28, 2022. and Discrete Logarithms on a Quantum Computer,” SIAM Journal on
Computing, Vol. 26, No. 5, 1997.
National Cyber Security Centre, “Quantum Security Technologies,”
white paper, March 24, 2020. Shumow, Dan, and Niels Ferguson, “On the Possibility of a Back Door in
the NIST SP800-90 Dual Ec Prng,” CRYPTO 2007, 2007.
National Institute of Standards and Technology, U.S. Department of
Commerce, “NIST Removes Cryptography Algorithm from Random Stehlé, Damien, and Ron Steinfeld, “Making NTRU as Secure as Worst-
Number Generator Recommendations,” press release, April 21, 2014, Case Problems over Ideal Lattices,” in K. G. Paterson, ed., Advances in
updated January 25, 2023. Cryptology: EUROCRYPT 2011, Springer, Lecture Notes in Computer
Science, Vol. 6632, 2011.
National Security Agency/Central Security Service, “NSAs
Cybersecurity Perspective on Post Quantum Cryptography Vermeer, Michael J. D., and Evan D. Peet, Securing Communications in
Algorithms,” webpage, undated. As of July 7, 2023: the Quantum Computing Age: Managing the Risks to Encryption, RAND
https://www.nsa.gov/Cybersecurity/NSAs-Cybersecurity-Perspective Corporation, RR-3102-RC, 2020. As of July 9, 2023:
-on-Post-Quantum-Cryptography-Algorithms/ https://www.rand.org/pubs/research_reports/RR3102.html
National Security Agency/Central Security Service, “NSA Cybersecurity Weibel, Alex, “Round 2 Post-Quantum TLS Is Now Supported in AWS
Perspectives on Quantum Key Distribution and Quantum KMS,” AWS Security Blog, November 16, 2023. As of July 7, 2023:
Cryptography,” news release, October 26, 2020. https://aws.amazon.com/blogs/security/
round-2-post-quantum-tls-is-now-supported-in-aws-kms/
NSA—See National Security Agency/Central Security Service.
White House, National Cybersecurity Strategy, March 2023.
Parker, Edward, and Michael J. D. Vermeer, Estimating the Energy
Requirements to Operate a Cryptanalytically Relevant Quantum Zhang, Wei, Tim van Leent, Kai Redeker, Robert Garthoff, René
Computer, RAND Corporation, WR-A2427-1, 2023. Schwonnek, Florian Fertig, Sebastian Eppelt, Wenjamin Rosenfeld,
Valerio Scarani, Charles C.-W. Lim, and Harald Weinfurter, “A Device-
Peikert, Chris, “Public-Key Cryptosystems from the Worst-Case Independent Quantum Key Distribution System for Distant Users,”
Shortest Vector Problem: Extended Abstract,” Proceedings of the Forty- Nature, Vol. 607, July 28, 2022.
First Annual ACM Symposium on Theory of Computing, Association for
Computing Machinery, 2009.
Peikert, Chris, “A Decade of Lattice Cryptography,” Foundations and
Trends in Theoretical Computer Science, Vol. 10, No. 4, March 2016.
Regev, Oded, “On Lattices, Learning with Errors, Random Linear
Codes, and Cryptography,” Journal of the ACM, Vol. 56, No. 6,
September 8, 2009.
Regev, Oded, The Learning with Errors Problem (Invited Survey), 2010
IEEE 25th Annual Conference on Computational Complexity, 2010.

15
About This Perspective For more information on HSRD, see www.rand.org/hsrd. For more infor-
mation on this publication, see www.rand.org/t/PEA2690-1.
Advanced quantum devices have the potential to break existing pro-
tections for communication technologies. This Perspective provides a
focused view of the search for novel protections for computer systems
Funding
through the field of post-quantum cryptography. The authors identify Funding for this research was provided by gifts from RAND supporters
two factors that affect the development of quantum-resistant algorithms and income from the operation of HSRD.
before discussing activities that can positively influence the outcome
of the pending migration away from vulnerable encryption standards About the Authors
and protocols. The primary audience of this Perspective is U.S. govern- Alvin Moon is an associate mathematician at the RAND Corporation.
ment policymakers who work on issues of cybersecurity and quantum His research papers have investigated theoretical models at the inter-
technology, although the findings should also be of interest to industry section of statistical mechanics and quantum information theory. He
stakeholders who will be affected by new cryptographic standards. has a Ph.D. in mathematics.

The RAND Homeland Security Research Division Michael J. D. Vermeer is a physical scientist at the RAND Corporation.
He is an expert on the cybersecurity risks created by quantum comput-
This research was conducted in the Management, Technology, and
ing and the challenges with broad adoption of post-quantum cryptogra-
Capabilities Program of the RAND Homeland Security Research Divi-
phy. He has a Ph.D. in chemistry.
sion (HSRD). HSRD operates the Homeland Security Operational
Analysis Center, a federally funded research and development center
(FFRDC) sponsored by the U.S. Department of Homeland Security.
HSRD also conducts research and analysis for other federal, state,
local, tribal, territorial, and public- and private-sector organizations
that make up the homeland security enterprise, within and outside the
Homeland Security Operational Analysis Center contract. In addition,
HSRD conducts research and analysis on homeland security matters
for U.S. allies and private foundations.

The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the
world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest.
Research Integrity
Our mission to help improve policy and decisionmaking through research and analysis is enabled through our core values of quality and
objectivity and our unwavering commitment to the highest level of integrity and ethical behavior. To help ensure our research and analysis
are rigorous, objective, and nonpartisan, we subject our research publications to a robust and exacting quality-assurance process; avoid
both the appearance and reality of financial and other conflicts of interest through staff training, project screening, and a policy of mandatory
disclosure; and pursue transparency in our research engagements through our commitment to the open publication of our research findings
and recommendations, disclosure of the source of funding of published research, and policies to ensure intellectual independence. For more
information, visit www.rand.org/about/research-integrity.
RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. is a registered trademark.
Limited Print and Electronic Distribution Rights
This publication and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for
noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to its webpage on rand.org is encouraged.
Permission is required from RAND to reproduce, or reuse in another form, any of its research products for commercial purposes. For
C O R P O R AT I O N information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
For more information on this publication, visit www.rand.org/t/PEA2690-1.
www.rand.org © 2023 RAND Corporation

PE-A2690-1

You might also like