Preparing for a Quantum World: Examining the Migration Path of Hybrid Certificates

August 20, 2024

For the migration to quantum-safe cryptography, the term “hybrid” is often used. In some discussions, the term itself leads to a deeper dive into what it means.

 

The term “hybrid cryptosystem” is not helpful, as it describes it as combining asymmetric and symmetric cryptosystems. This is not what it means in the context of post-quantum cryptography discussions.

 

What everyone means by “hybrid cryptography” in the context of quantum-safe is combining classic asymmetric cryptography with post-quantum asymmetric cryptography. For example, combinations like EC + Dilithium, RSA + SPHINCS+, ECDH + Kyber or others where classic or traditional algorithms typically mean RSA or EC and post-quantum mean Dilithium SPHINCS+, Kyber or one of the other proposed post-quantum algorithms.

 

 

Why Do We Need Hybrid Systems?

There are at least two arguments for hybrid systems:

 

  1. During a migration phase, there will be endpoints that are PQC-capable and those that are not. To enable them to communicate, a backward-compatible hybrid solution is needed where they can negotiate capabilities. If both endpoints are PQC-capable, they can use post-quantum cryptography. If one endpoint is not PQC-capable, it can fall back to classic encryption.
  2. Some of the new post-quantum algorithms and their implementations are not as well analyzed and battle tested as classic encryption algorithms, resulting in a fear that some PQC algorithms may, in the future, be broken by today’s computers. By cleverly combining algorithms in a hybrid design, you can enforce verification of both. If a future quantum computer breaks RSA and EC while PQC algorithms are safe, the PQC part of the hybrid system will protect the whole. If current computers are able to break PQC algorithms, and no cryptographically relevant quantum computer exists, the classic algorithm protects the whole.

 

 

What Are the Use Cases for Hybrid?

 

  • TLS connections: Protecting data in transit from decryption against today’s computers and potential quantum computers of the future
  • Digital identities: Usually in the form of certificates to protect authentication from today’s and future threats
  • Digital signatures: Protecting the integrity of code and documents far into the future

 

 

Who Wants Hybrid Systems?

Some organizations are against hybrid systems, while some are in favor. The conclusion that is easiest to make is “it depends,” which is, unfortunately, one of the most used phrases in cybersecurity when asked for simple advice. Whether you need or want hybrid systems depends on your use case, threat level, ability to manage complexity and many other factors.

 

If I would dare to draw any consensus, it would be that there are lots of skilled organizations out there, and if someone considers hybrid systems essential, I will not argue against them. But if they consider hybrid systems unnecessary, I will not argue against that, either. As it stands, we will likely have to live with both hybrid and non-hybrid solutions for a long time.

 

 

Hybrid PKI Migration Paths

We have identified four different PKI migration paths using different types of non-hybrid and currently proposed hybrid solutions. The names given to the different approaches are my own invention. Which strategy an organization should use will depend on the use case and how much control they have on the endpoints and their capabilities.

 

  1. Complete migration with hard cutoff: A new PKI is set up using a post-quantum algorithm, all endpoints are PQC capable, the classic PKI is retired, certificates are issued from the new PQC PKI and the old PKI is shut down very soon after the new PKI goes into production.
  2. Transitional migration with soft cutoff: A new PKI is set up using a post-quantum algorithm, both PKIs live in parallel for an extended period and clients can be issued with either a classic certificate or a PQC certificate, or both, depending on their capabilities.
  3. Hybrid backward-compatible migration: A new PKI is set up with backward-compatible hybrid certificates, the new PKI can issue certificates to PQC-capable devices and non-PQC-capable devices will simply ignore the PQC algorithms and negotiate classic cryptography. The old PKI can be shut down and replaced with the new backward-compatible hybrid PKI.
  4. Composite non-backward-compatible migration: A new PKI is set up with non-backward-compatible hybrid certificates (composites). It’s similar to a hard or soft cutoff in that PQC certificates can only be issued to PQC-capable devices, with the additional feature that post-quantum cryptography is also protected by classic cryptography.

 

Image
quantum_world_img1.png

 

Pros and cons of different strategies, and demands on the environment, are topics for another post. There is, of course, nothing to prevent combinations of the above strategies, either.

 

 

Outlook

Migration to a complete set of new algorithms will not be a walk in the park. Something may look simple, but in general, there are a lot of things out there with hundreds of thousands of different use cases and millions of different environments. There is no one-size-fits-all solution, which is why we must develop multiple, different migration strategies — something that, unfortunately, adds complexity.

 

In the meantime, discover how organizations are making strides to prepare and protect their data from the future threat of quantum computing in Keyfactor’s report, The State of Quantum Readiness in 2024.

Tomas Gustavsson
Chief PKI Officer | Keyfactor
Tomas Gustavsson has a MSc from KTH in Stockholm and has been researching and implementing PKI systems since 1994. He is the founder and developer of the open source enterprise PKI project EJBCA, a contributor to numerous open source projects and a member of the board of Open Source Sweden. As a co-founder of PrimeKey, Tomas is passionate about helping users worldwide find the best possible PKI and digital signature solutions.

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?