Secure Mail Client | Academy /
Advanced 45 minutes

Post-Quantum Cryptography Preparation

Introduction to Quantum Computing and Cryptography

Modern cryptography forms the foundation of our digital security infrastructure, from secure communications to financial transactions. Yet, the emergence of quantum computing represents a paradigm shift that could fundamentally alter this landscape. This module explores how quantum computing affects cryptography, what post-quantum cryptography entails, and how to prepare for a quantum-resilient future.

Security Alert

The Quantum Timeline

While fully capable cryptographically-relevant quantum computers do not exist today, the timeline for their development is uncertain. Most experts estimate that quantum computers capable of breaking current cryptographic standards are 5-15 years away. However, the "harvest now, decrypt later" threat means that encrypted data collected today could be decrypted once quantum computers become available, making preparation necessary now.

Understanding Quantum Computing Fundamentals

To appreciate the impact of quantum computing on cryptography, it's essential to understand some basic principles of how quantum computers operate differently from classical computers.

Classical vs. Quantum Computing

Classical Computing

  • Uses bits that represent either 0 or 1
  • Operations performed sequentially
  • Processing power scales linearly with additional resources
  • Deterministic outcomes from computations

Quantum Computing

  • Uses qubits that can exist in superposition (representing both 0 and 1 simultaneously)
  • Leverages quantum entanglement for correlation between qubits
  • Can perform many calculations in parallel
  • Processing power can scale exponentially with additional qubits
  • Probabilistic measurement outcomes

Key Quantum Algorithms Affecting Cryptography

  • Shor's Algorithm (1994): Efficiently factors large integers and solves discrete logarithm problems, threatening RSA, ECC, and Diffie-Hellman
  • Grover's Algorithm (1996): Provides quadratic speedup for searching unsorted databases, affecting symmetric ciphers by effectively halving their key lengths

The Quantum Threat to Current Cryptography

The security of our current public-key cryptography standards relies on mathematical problems that are computationally hard for classical computers but vulnerable to quantum algorithms.

Vulnerable Cryptographic Systems

Cryptosystem Security Foundation Quantum Vulnerability Estimated Quantum Resources Needed
RSA Integer factorization Shor's algorithm ~4,000+ logical qubits for 2048-bit RSA
ECC Elliptic curve discrete logarithm Shor's algorithm ~1,000-2,000 logical qubits for 256-bit ECC
Diffie-Hellman Discrete logarithm problem Shor's algorithm Similar to RSA based on group size
DSA/ECDSA Discrete logarithm or elliptic curve Shor's algorithm Similar to corresponding DH or ECC
AES-256 Substitution-permutation network Grover's algorithm Effectively reduces security to ~128 bits
SHA-256 Merkle–Damgård construction Grover's algorithm Effectively reduces collision resistance to ~128 bits

For PGP/GPG users, this means that current key pairs based on RSA or ECC could eventually be compromised by quantum computers, potentially exposing encrypted communications and invalidating digital signatures.

Warning

Store Now, Decrypt Later

One of the most significant concerns is adversaries collecting and storing encrypted data today with the intention of decrypting it once quantum computers become available. This is particularly problematic for information that must remain confidential for many years, such as government secrets, intellectual property, or personal health data.

Post-Quantum Cryptographic Algorithms

Post-quantum cryptography (PQC) refers to cryptographic algorithms believed to be secure against quantum computer attacks. These algorithms rely on mathematical problems that are difficult for both classical and quantum computers to solve.

NIST Post-Quantum Cryptography Standardization Process

In 2016, the National Institute of Standards and Technology (NIST) initiated a process to evaluate and standardize quantum-resistant cryptographic algorithms. After multiple rounds of rigorous analysis, NIST has selected several candidates for standardization.

NIST Selected Algorithms

Public-Key Encryption/Key Establishment
  • CRYSTALS-Kyber: Lattice-based algorithm selected as the primary standard
Digital Signatures
  • CRYSTALS-Dilithium: Primary standard based on lattice problems
  • FALCON: Alternative standard, also lattice-based but with different tradeoffs
  • SPHINCS+: Stateless hash-based signature scheme as a more conservative option
Additional Candidates Under Consideration
  • Classic McEliece: Code-based encryption scheme
  • BIKE: Bit flipping key encapsulation
  • HQC: Hamming quasi-cyclic
  • NTRU Prime: Alternative lattice-based approach

Major Families of Post-Quantum Algorithms

Lattice-Based Cryptography

Based on the hardness of finding short vectors in high-dimensional lattices.

  • Pros: Efficient, versatile, supports advanced functionalities
  • Cons: Complex security analysis, parameter selection critical
  • Examples: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, NTRU

Hash-Based Cryptography

Builds security from the properties of cryptographic hash functions.

  • Pros: Simple security analysis, well-understood properties
  • Cons: Larger signatures, some variants require state management
  • Examples: SPHINCS+, LMS, XMSS

Code-Based Cryptography

Security based on the hardness of decoding general linear codes.

  • Pros: Long history of cryptanalysis, simple operations
  • Cons: Large key sizes
  • Examples: Classic McEliece, BIKE, HQC

Multivariate Cryptography

Based on the difficulty of solving systems of multivariate polynomials over finite fields.

  • Pros: Fast signature verification
  • Cons: Large keys, many schemes have been broken
  • Examples: Rainbow (broken in 2022), GeMSS

Tip

Why Multiple Approaches Matter

Cryptographic diversity is crucial for security. Different mathematical foundations provide resilience against breakthroughs that might affect one approach but not others. NIST has deliberately selected algorithms from different families to ensure alternatives exist if vulnerabilities are discovered in any particular approach.

Current Status of PGP/GPG and Post-Quantum Cryptography

PGP/GPG implementations are gradually beginning to incorporate post-quantum cryptography, though the transition is still in early stages.

Current Developments

  • OpenPGP Specification Evolution: The OpenPGP working group is developing extensions to support post-quantum algorithms
  • GnuPG Experimentation: GnuPG has begun experimental implementation of post-quantum algorithms, though not yet in production releases
  • Hybrid Approaches: Current best practice involves hybrid cryptography that combines traditional and post-quantum algorithms
  • Commercial Solutions: Some specialized secure communication tools have begun implementing post-quantum options
Adoption Challenges

PGP/GPG adoption of post-quantum algorithms faces several challenges, including standardization delays, backward compatibility concerns, performance considerations, and the need for thorough security analysis before widespread deployment.

Practical Post-Quantum Preparation Strategies

As the cryptographic landscape evolves, organizations and individuals using PGP/GPG should develop strategies to prepare for the post-quantum era.

Risk Assessment

Evaluating Your Quantum Risk Exposure

Key Questions to Consider
  • What information are you protecting with current cryptography?
  • How long must this information remain confidential?
  • Who are your adversaries and what are their capabilities?
  • Are you subject to "harvest now, decrypt later" attacks?
  • What regulatory requirements might mandate quantum-resistant cryptography?
Risk Classification
High Risk Long-term secrets, national security, critical infrastructure
Medium Risk Business intellectual property, financial records, personal identifiable information
Lower Risk Short-lived data, public information, already-published content

Technical Preparation

Concrete Steps for PGP/GPG Users

  • Implement Cryptographic Agility: Design systems to easily transition between cryptographic algorithms. Avoid hardcoding specific algorithms or key formats.
  • Use Hybrid Cryptography: When available, implement hybrid approaches that combine traditional and post-quantum algorithms, protecting against both classical and quantum threats.
    # Example of hybrid approach concept
    Traditional: RSA-2048 or ECC P-256 for key exchange
    Combined with: CRYSTALS-Kyber for quantum resistance
    Result: Communication secure unless both algorithms are broken
  • Increase Symmetric Key Lengths: Move to AES-256 for symmetric encryption to maintain adequate security against Grover's algorithm.
  • Prepare for Larger Key Sizes and Signatures: Post-quantum algorithms often require larger keys and signatures. Ensure systems can handle these increased sizes.
  • Monitor GnuPG Developments: Stay informed about experimental branches and updates from the GnuPG team regarding post-quantum integration.

Organizational Preparation

  1. Develop a Transition Roadmap: Create a phased approach for moving to post-quantum cryptography
  2. Identify Critical Systems: Prioritize high-value, long-lived data protection systems for early migration
  3. Test and Experiment: Set up test environments to evaluate post-quantum implementations as they become available
  4. Update Security Policies: Revise policies to address quantum threats and migration strategies
  5. Train Technical Staff: Ensure relevant personnel understand post-quantum concepts and implementation requirements

Implementation Example: Hybrid Approach with Secure Mail Client

While full post-quantum PGP/GPG implementations are still developing, here's how Secure Mail Client could implement a hybrid approach when such capabilities become available:

Hybrid Encryption Workflow

  1. Key Generation: Create both traditional (RSA/ECC) and post-quantum (e.g., CRYSTALS-Kyber) key pairs
  2. Message Encryption:
    • Generate a random symmetric key for AES-256 encryption
    • Encrypt the symmetric key using the recipient's traditional public key
    • Encrypt the same symmetric key using the recipient's post-quantum public key
    • Include both encrypted keys in the message header
    • Encrypt the message body with the symmetric key
  3. Signature Generation:
    • Generate a traditional signature (RSA/ECDSA) for the message
    • Generate a post-quantum signature (e.g., CRYSTALS-Dilithium) for the same message
    • Include both signatures with the message
  4. Decryption and Verification:
    • Decrypt the symmetric key using either or both private keys
    • Use the symmetric key to decrypt the message
    • Verify at least one of the signatures (preferably both)
Security Properties

This hybrid approach ensures security as long as at least one of the encryption methods remains unbroken. Even if quantum computers can break the traditional cryptography, the post-quantum layer maintains security. Conversely, if unexpected vulnerabilities are discovered in newer post-quantum algorithms, the traditional cryptography provides a security backstop.

Future Outlook

The transition to post-quantum cryptography represents one of the most significant changes in the cryptographic landscape in decades. Here's what to expect in the coming years:

Near-Term (1-3 Years)

  • Finalization of NIST standards
  • Experimental PGP/GPG implementations
  • Early adopters implementing hybrid approaches
  • Initial regulatory guidance

Mid-Term (3-7 Years)

  • Widespread implementation in critical systems
  • Production-ready PGP/GPG with post-quantum algorithms
  • New OpenPGP standards incorporating PQC
  • Regulatory requirements in sensitive industries

Long-Term (7+ Years)

  • Complete transition to post-quantum cryptography
  • Potential emergence of quantum computers capable of breaking RSA/ECC
  • New generation of cryptographic protocols designed specifically for post-quantum era
  • Legacy system migration completion

Security Alert

Quantum Computing vs. Post-Quantum Cryptography

It's important to distinguish between quantum computing and post-quantum cryptography. Quantum computing represents the threat, while post-quantum cryptography is the solution. Post-quantum cryptographic algorithms don't require quantum computers – they're conventional algorithms designed to run on classical computers but resistant to attacks from quantum computers.

Conclusion

The quantum threat to cryptography represents a significant but manageable challenge. Rather than a cause for immediate alarm, it calls for thoughtful planning and gradual transition.

PGP/GPG users should stay informed about developments in post-quantum cryptography, begin assessing their risk exposure, and prepare systems for eventual migration to quantum-resistant algorithms. By taking a proactive approach, we can ensure that our communications and data remain secure in the post-quantum era.

Next Steps

  • Assess your own cryptographic risk profile based on sensitivity and longevity of protected information
  • Monitor updates from GnuPG and other OpenPGP implementations regarding post-quantum integration
  • Consider moving to AES-256 for symmetric encryption if not already using it
  • Experiment with available post-quantum implementations in test environments
  • Develop a transition plan for your critical cryptographic systems

In This Module

Share This Module

Related Modules