[Libpki-devel] Post-Quantum Certificates and Composite Crypto (Hybrid Certs)
Easy to use PKI library
Brought to you by:
openca
From: Dr. P. <dir...@op...> - 2022-12-15 23:33:11
|
Hello LibPKI Community, as some of you noticed, we have been working, recently, to provide support for post-quantum certificates in LibPKI. Specifically, the current version of the source (0.9.6) is looking at exploring few different options for the next generation PKIs. Here's some of the features we are working on that we really would like the community support for. *Composite Crypto Support (Hybrid Classic and Post-Quantum)* LibPKI is adding support for using multiple algorithms/keys via the Composite Crypto idea that we are promoting for standardization at the IETF. The Composite Crypto option combines multiple public keys in certificates and multiple signatures in all X.509 and other data structures we support. You can find more info here: * https://github.com/EntrustCorporation/draft-ounsworth-pq-composite-keys (composite keys) * https://github.com/EntrustCorporation/draft-ounsworth-composite-sigs (composite signatures) Many companies and projects are implementing this solution to provide Hybrid options for the ones of us that do not trust neither classic or post-quantum by itself. The LibPKI implementation, currently, generates a new Algorithm (the COMPOSITE) and allows for generating keys, requests, etc. More work is needed to provide support for explicit combinations of algorithms and for the verifying of multiple signatures within a composite signature. The use of Composite Crypto could be seen as a one-off need or maybe a change in our field. Specifically, the question that it is on our minds is about the longevity of PKIs (i.e., 50 years horizons). With the advent of post-quantum cryptography and group-based theories, maybe the time for long-term PKIs is now over? Maybe it is time for us to really look into shorter crypto-periods (7-10 years) and evolution of PKIs into dynamic ecosystems (7-10 years with migration built-in). If you are interested in working on Composite Crypto... please join our efforts! The IETF discussion on Hybrid certificates is available from the LAMPS working group: * https://mailarchive.ietf.org/arch/browse/spasm/ (mailing list archive) *Post-Quantum Certificates (Direct vs. Hash-n-Sign)* The standardization process for post-quantum public-key cryptography has progressed into its final phase and we need to start talking about how we are going to integrate these new algorithms in our certificates and PKIs. We are leading a small group of people and companies to investigate and propose approaches for how to use, for example, direct signing vs. hash-n-sign. This has many implications for the use of hybrid cryptography (i.e., the number of different OIDs to identify algorithm combinations). The LibPKI support is provided through the OQS library and the OQS-OpenSSL wrapper that is available here: * https://openquantumsafe.org/ We are also working on a LibPKI-native implementation of Dilithium to investigate the use of a single algorithm identifier to handle all security levels of the algorithms (i.e., Dilithium2022 -> Level 2, Level 3, and Level 5). At IETF 115 we started a interoperability project/hackaton for PQC and Composite Crypto. The project was started at IETF 115 Hackaton and is supported by many different entities such as big companies (e.g., DigiCert, CISCO, etc.) and open-source projects (e.g., PyCrypto, Rust Crypto). The GITHUB repository is available here: * https://github.com/IETF-Hackathon/pqc-certificates *A Complex World Requires Higher Ethics* When we started the OpenCA projects, we lived in a different world. Regrettably, today, terrorists countries like Russia are threatening the world-peace, making all other issues that we are dealing with much worst. At OpenCA Labs, we condemn the use of violence in any form and, in particular, the use of WAR as an instrument of political gain. Russia and all the countries that continue to support a terrorist attack on the sovereign country of Ukraine are on the WRONG side of history and we will do everything we can to support the free people of Ukraine. Because of these reasons, we have changed our LICENSE agreement to make sure that we do not directly or indirectly support terrorists, violence, and wars. If you or your organization are directly or indirectly supporting the war or the Russian terrorist country, please be aware that you are no longer among the welcome people in our community and you are legally required NOT to use any of our products. We hope that this policy will make you change your mind about supporting terrorism, violence, and death. *Happy Holidays* We hope that the world could grow and understand the need for a more ethical and intelligent way of taking decisions and in the meantime we would like to wish you all the best possible holidays you can celebrate. At OpenCA we will never stop striving for a better world with our work and commitment to providing easy security for all. Happy Holidays!!! -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo |