The transition to post-quantum cryptography (PQC) poses challenges for certificate-based identity management in industrial settings. This research examines integrating PQC into X.509 certificates, identifying gaps in open-source tools for hybrid and composite certificates. A proof-of-concept tool using the Bouncy Castle library supports classical, hybrid, composite, and partially chameleon certificates with algorithms like ML-DSA and SLH-DSA, demonstrating compatibility with standard workflows and suitability for constrained platforms. The implementation is modular and publicly available, aiming to aid PQC migration research. Comparisons with Openssl-based solutions reveal standardisation, toolchain support, and algorithm coverage limitations.
The transition to post-quantum cryptography (PQC) is essential due to quantum computers’ potential threat to current cryptographic systems. Nino Ricchizzia from Lucerne University of Applied Sciences and Arts, along with Christian Schwinneb and Jan Pelzlb from Hamm-Lippstadt University of Applied Sciences, have addressed this challenge in their work titled Applied Post Quantum Cryptography: A Practical Approach for Generating Certificates in Industrial Environments. Their research focuses on integrating PQC into X.509 certificate structures, examining various types such as classical, hybrid, composite, and chameleon certificates. They identified gaps in existing open-source tools, particularly in generating and validating hybrid and composite certificates via command-line interfaces.
Ricchizzia et al. developed a proof-of-concept tool using the Bouncy Castle library to tackle these issues, supporting PQC algorithms like ML-DSA and SLH-DSA. This tool is designed for compatibility with standard X.509 workflows, modular operation, and use in constrained industrial environments. Their comparison with Openssl-based solutions revealed limitations in standardisation, toolchain support, and algorithm coverage, highlighting the improvements their solution offers.
X.509v3 certificates integrate post-quantum cryptography to counter quantum threats.
Integrating post-quantum cryptography into X.509v3 certificates is driven by the looming threat of quantum computing to current cryptographic systems. The paper explores two approaches: hybrid certificates, which combine classical encryption with post-quantum methods like NIST‘s lattice-based algorithms, offering backward compatibility and quantum resistance, though potentially increasing data size and affecting performance.
Chameleon certificates allow updates without changing identity, enhancing long-term security but posing challenges in trust validation and regulatory compliance. The broader context involves transitioning to quantum-resistant systems, requiring updates to certificate authorities, TLS protocols, and client software for hybrid certificate compatibility. Resource constraints, particularly in Iot devices, necessitate optimised implementations.
Legal aspects include navigating regulatory hurdles during renewals, especially in regulated industries. Collaboration efforts, such as the Trustpoint project, underscore the importance of industry-academia partnerships for real-world testing and deployment.
Standardization efforts by bodies such as NIST and ETSI are crucial for ensuring interoperability. However, the slow pace of these initiatives could delay widespread adoption, highlighting a significant challenge in the field. Developing robust standards is essential to facilitate seamless integration across different systems and platforms.
Implementation challenges include addressing legacy support, managing performance overhead due to more intensive computations, and efficiently handling larger keys associated with post-quantum cryptography. These issues require careful consideration to ensure new cryptographic methods do not compromise system performance or usability.
Backward compatibility remains a critical concern, particularly for sectors with long equipment lifespans, such as industrial IoT and critical infrastructure. The paper presents its approach as a complementary reference implementation, aiding research without disrupting existing infrastructure. This stance allows for experimentation and gradual adoption, positioning the work as a foundational contribution to the field while acknowledging the need for further research on performance impacts and potential vulnerabilities in hybrid approaches.
👉 More information
🗞 Applied Post Quantum Cryptography: A Practical Approach for Generating Certificates in Industrial Environments
🧠 DOI: https://doi.org/10.48550/arXiv.2505.04333
