Virtual Private Networks in the Quantum Era: A Security in Depth Approach

被引:2
作者
Schatz, David [1 ]
Altheide, Friedrich [1 ]
Koerfgen, Hedwig [2 ]
Rossberg, Michael [1 ]
Schaefer, Guenter [1 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
来源
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023 | 2023年
关键词
Virtual Private Networks; Internet Key Exchange; Quantum Key Distribution; Multipath Key Reinforcement;
D O I
10.5220/0012121800003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional asymmetric cryptography is threatened by the ongoing development of quantum computers. A mandatory countermeasure in the context of virtual private networks (VPNs) is to use post-quantum cryptography (PQC) as a drop-in replacement for the authenticated key exchange in the Internet Key Exchange (IKE) protocol. However, the results of the ongoing cryptanalysis of PQC cannot be predicted. Consequently, this article discusses orthogonal methods for quantum-resistant key exchanges, like quantum key distribution (QKD) and multipath key reinforcement (MKR). As each method has limitations when used on its own, we conclude that it is best to maximize security by combining all available sources of symmetric key material to protect traffic inside a VPN. As one possible realization, we propose a lightweight proxy concept that uses available symmetric keys, like QKD and MKR keys, to implement a transparent cryptographic tunnel for all IKE packets, and consequently for PQC key exchanges. In contrast to combining PQC and symmetric key material within the IKE protocol, our approach provides security in depth: If secure symmetric keys are available, attacks on IKE and hence on PQC algorithms are infeasible. But even otherwise, the security properties of IKE and thus PQC are not weakened, so the overall security of the VPN is guaranteed to increase.
引用
收藏
页码:486 / 494
页数:9
相关论文
共 46 条
  • [21] Name-Based Address Mapping for Virtual Private Networks
    Suranyi, Peter
    Shinjo, Yasushi
    Kato, Kazuhiko
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (01) : 200 - 208
  • [22] Security of quantum key distribution with virtual mutually unbiased bases
    Li, Hong-Wei
    Hao, Chen-Peng
    Chen, Zhi-Jiang
    Gong, Li
    Lu, Yi-Fei
    Wang, Yang
    Li, Jia-Ji
    Zhang, Chun-Mei
    Wang, Rong
    Yin, Zhen-Qiang
    Cai, Qing-Yu
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2024, 67 (07)
  • [23] DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources
    Jarray, Abdallah
    Quttoum, Ahmad Nahar
    Otrok, Hadi
    Dziong, Zbigniew
    COMPUTER COMMUNICATIONS, 2012, 35 (08) : 906 - 915
  • [24] Scalable network resource management for large scale Virtual Private Networks
    Yu, W
    Wang, J
    SIMULATION MODELLING PRACTICE AND THEORY, 2004, 12 (3-4) : 263 - 285
  • [25] Resource optimization algorithms for virtual private networks using the hose model
    Ghobadi, Monia
    Ganti, Sudhakar
    Shoja, Gholamali C.
    COMPUTER NETWORKS, 2008, 52 (16) : 3130 - 3147
  • [26] Quantum Cryptography for Future Networks Security: A Systematic Review
    Durr-E-Shahwar
    Imran, Muhammad
    Altamimi, Ahmed B.
    Khan, Wilayat
    Hussain, Shariq
    Alsaffar, Mohammad
    IEEE ACCESS, 2024, 12 : 180048 - 180078
  • [27] Network parameter estimation for voice data transmission in virtual private networks
    Zagursky, V
    Riekstinch, A
    PROCEEDINGS EC-VIP-MC 2003, VOLS 1 AND 2, 2003, : 811 - 815
  • [28] Secure Hierarchical Virtual Private LAN Services for Provider Provisioned Networks
    Liyanage, Madhusanka
    Ylianttila, Mika
    Gurtov, Andrei
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 233 - 241
  • [29] Capacity planning in IP Virtual Private Networks under mixed traffic
    Bolla, R
    Bruschi, R
    Davoli, F
    COMPUTER NETWORKS, 2006, 50 (08) : 1069 - 1085
  • [30] Hierarchical provisioning algorithm for Virtual Private Networks using the hose model
    Ghobadi, Monia
    Ganti, Sudhakar
    Shoja, Gholamali C.
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 2467 - 2471