As the world prepares for large-scale quantum computing, concerns about security and trust are growing. Traditional cryptographic methods, such as RSA and ECC, may be vulnerable to attacks from powerful quantum computers.
To address this threat, companies like Cisco are developing post-quantum trust anchors to ensure the integrity and authenticity of software and firmware.
One key technology used is Hash-Based Signature (HBS) schemes, which are widely accepted as secure against quantum attacks. Researchers at Cisco, including David McGrew, Scott Fluhrer, and Michael Curcio, have co-authored a standard for one such scheme, called LMS, which has been approved by the National Institute of Standards and Technology (NIST).
Cisco already employs quantum-secure vital sizes and algorithms in some platforms and plans to roll out additional capabilities. The company aims to make trust anchors ubiquitous and secure against quantum attacks. This ensures that confidential data exchanged online today cannot be decrypted later when viable quantum computing becomes available.
Post-Quantum Trust Anchors: Ensuring Security and Trust in a Quantum Computing World
The advent of quantum computing poses significant threats to traditional cryptographic systems, which are the backbone of modern security infrastructure. In response, Cisco has been actively developing and deploying post-quantum trust anchors that can resist attacks from large-scale quantum computers.
This article delves into the details of Cisco’s post-quantum trust anchor technology, highlighting the cryptographic algorithms and techniques used to ensure security and trust in a post-quantum computing world.
PQ Signatures: A Fundamental Component of Trust Anchor Technology
Cryptographic signatures are essential for trust anchor technology, but traditional signature methods based on RSA or ECC (Elliptic Curve Cryptography) may be vulnerable to attacks from large-scale quantum computers.
To address this concern, Cisco has adopted Hash-Based Signature (HBS) schemes, which are widely accepted as secure against quantum attacks.
Specifically, Cisco uses the LMS (Leighton-Micali Signature) scheme, a stateful HBS algorithm that is efficient in signature verification and suitable for resource-constrained devices.
For general use cases, Cisco employs the ML-DSA (Module Lattice-Based Digital Signature Algorithm) scheme, which is standardized by NIST in FIPS 204. This algorithm is based on the module lattice problem, believed to be hard for quantum computers to solve.
By using these post-quantum signature algorithms, Cisco ensures its trust anchor technology can resist attacks from large-scale quantum computers.
Hashes: Ensuring Software Integrity
Hash functions play a critical role in verifying software integrity. To ensure post-quantum security, Cisco uses 512-bit hashes, specifically SHA512 of the SHA2 hash family. This provides a high level of security against anticipated quantum attacks for many years to come.
The Secure Boot feature in Cisco devices automatically verifies the integrity and authenticity of loaded firmware and software, providing an additional layer of security.
Symmetric Algorithms: Securing System Functions
Cisco uses Field-Programmable Gate Arrays (FPGAs) to implement various system functions, including trust anchor designs and datapath crypto FPGAs. To secure these devices, Cisco employs 256-bit AES keys to encrypt the configuration bitstream. This ensures that even if an attacker gains access to the device, they will not be able to extract sensitive information.
The Path Ahead: Ubiquitous PQ Trust Anchors
Cisco’s goal is to achieve ubiquitous post-quantum trust anchors across its product portfolio. To this end, the company plans to continue introducing quantum-safe algorithms in its Trustworthy Systems technologies.
The LDWM and LMS signature schemes will be integrated into more platforms, ensuring that Cisco devices can resist attacks from large-scale quantum computers.
Furthermore, Cisco will continue to research post-quantum cryptography and collaborate with the industry to introduce it in protocols and use cases. This will help achieve a quantum-safe future where confidential data exchanged online today cannot be decrypted later when viable quantum computing becomes available.
