Threat Modelling on a Secure File Transfer solution using QKD keys

We want to establish:

Claim: Quantum Key Distribution (QKD) uses quantum properties of light to distribute indeterministic and unpredictable sets of keys between two communicating nodes. This makes the communications encrypted using these keys quantum-safe.

But the devil is in the details, so we do a simple table-top threat modelling exercise to understand the system better. The framework we will use is STRIDE (by Kohnfelder and Garg of Microsoft) as it is well suited for evaluating data security applications.

Architecture

The application we will evaluate is a simple Secure File Transfer Solution shown in Figure 1.

Figure 1. Simple Secure File Transfer setup using AES encryption keys from a QKD network. Scope of threat modelling is shaded in yellow

An example usage scenario would be:

  • Alice connects to the her File Server to send a file
  • Alice's File Server connects to Alice's QKD Node to obtain an AES Key to encrypt the file
  • Encrypted file is transmitted to Bob's File Server
  • Bob connects to his File Server to view the file.
  • Bob's File Server connects to Bob's QKD Node to obtain an AES key to decrypt the file

Assumptions

We assume the following:

  • Communication between the File Servers and QKD Nodes is using mutual-TLS v1.3.
  • Proper certificate and key handling have been done to create the respective X.509 certificates and keys and install them securely in the respective devices.
  • 256-bit keys used for AES encryption / decryption are quantum-safe. We should not accept anything less.
  • The file encryption scheme is at least IND-CPA secure (e.g., AES-CBC with random IV, or AES-CTR with random nonce)

Threat Modelling Exercise

We focus the modelling on the communications between the File Servers with the QKD Nodes as shown in yellow (Figure 1). We also include a "Next steps" column for follow-up action needed.

NoThreatAttackOutcomeRemarksNext steps
1Spoofing the QKD Node Attacker creates a fake QKD Node to respond to Alice's or Bob's request for an AES keyMutual TLS session setup will fail since the attacker will have to also steal the TLS private keyReliant on classical  cryptography for authenticationThis needs to be upgraded to post-quantum TLS in the future
2Spoofing the QKD NodeAttacker creates a man-in-the-middle device between the 2 QKD Nodes to relay quantum communications and key negotiationsAttacker can potentially know the AES keys that are generated by the QKD NodesMore in-depth study is needed to understand how the QKD Nodes can detect and defend against man-in-the-middle attacksAsk the QKD vendor for more information
3Spoofing the File ServerAttacker creates a fake File Server to send requests to the QKD NodesMutual TLS session setup will fail since the attacker will have to also steal the TLS private keyReliant on classical cryptography for authenticationThis needs to be upgraded to post-quantum TLS in the future
4Tampering the QKD Node response for AES keyAttacker modifies the response from the QKD Node to the File ServerTLS communication will detect integrity failures in the communication  Reliant on classical cryptography for authenticationThis needs to be upgraded to post-quantum TLS in the future
5Tampering the QKD Node key negotiationsAttacker modifies the TCP/IP key negotiation packetsAssuming the QKD Nodes are using BB84, Bob's QKD Node may arrive at a different key compared to Alice's QKD NodeConfidentiality is not affected, but files sent by Alice may not be decrypted by BobCan consider using TLS to improve the integrity of the communication
6Receiver Repudiation Attacker sends some random file to Bob, claiming it is from AliceBob is unable to decrypt the file. Bob is unable to prove that it is / is not from AliceNon-repudiation is not a security primitive supported by QKD-
7Sender RepudiationAlice sends an encrypted file which Bob can decrypt. Alice refuses to admit she sent the fileBob knows that the file came from Alice. However, Bob cannot prove to a 3rd party that the file came from AliceNon-repudiation is not a security primitive supported by QKD-
8Information (Key) disclosed at QKD nodeAttacker installs a malware in the QKD Node to sniff for keys before it is sent to the File ServerAttacker can potentially know the AES keys that are generated by the QKD NodesMore in-depth study is needed to understand how the QKD Nodes can detect and defend against internal malwareAsk the QKD vendor for more information
9Information (Key) disclosed in Quantum communication linkAttacker selectively samples some of the quantum photonic communications to guess the keyAssuming the QKD Nodes are using BB84, the attacker can recover up to 25% of the AES key without being detectedFile Servers should not directly use the AES Key returned from the QKD Node for encryption The AES Key should be further derived with other quantum-safe secret material to ensure full key strength of 256 bits
10Information (Key) disclosed in response from QKD Node Attacker sniffs the network between the File Server and QKD Node to collect the TLS traffic, and use a quantum computer in the future to decryptThe AES keys used for File encryption/decryption are susceptible to harvest-now-decrypt-later (HNDL) attacksThe communication between the File Servers and QKD Nodes require post-quantum TLSThe AES key should be further derived with other quantum-safe secret material to prevent the HNDL attack
11Denial of Service (DOS)Attacker breaks the quantum communication link between the QKD NodesNo more AES keys can be returned by the QKD NodesQKD setups are susceptible to DOS attacksAlternative quantum-safe sources of keys must be made available to prevent DOS attacks
12Elevation of PrivilegeAttacker obtains the admin credentials to login to QKD Node Attacker can potentially look at the logs and gain access to AES keysMore in-depth study on the QKD Node is requiredProper access control must be put in place for the QKD Nodes

Clearly there are a lot more threat scenarios that can be examined, but you get the idea.

Conclusion

Our simple (and incomplete) threat modelling exercise has yielded 12 scenarios, we have found that:

  • Scenario 5 (Tampering of quantum communications) shows that confidentiality is not compromised due to the properties of quantum communications. Using TLS between QKD nodes can improve the integrity of the communications.
  • Scenarios 1, 3 and 4 rely on classical TLS authentication which needs to be upgraded in the near future.
  • Scenarios 6 and 7 (Non repudiation) are out of scope for QKD implementations.
  • Scenarios 2, 8 and 12 are implementation-specific topics for QKD Nodes, and need to be studied in more detail to ascertain its security.
  • Scenarios 9, 10 and 11 (Disclosure of keys, Denial of Service) highlight vulnerable areas which must be fixed/mitigated before such a system is used for actual production.

Ask your QKD vendor how it mitigates against (i) Man-in-the-middle attacks; (ii) Malware in the QKD Node; (iii) Harvest-now-decrypt-later attacks on API connections; (iv) Sniffing of partial keys by eavesdroppers; (v) Service unavailability due to connection disruptions; (vi) Unauthorized logins to the QKD Node.

At pQCee, we have implemented QKDLite, a key management middleware which implements post-quantum TLS, integrates with FIPS140-certified HSMs, includes built-in quantum-safe key derivation, with end-to-end encryption to provide the necessary security constructs to ensure a quantum-safe and secure implementation of Secure File Transfer. 

Our QKDLite for Secure File Transfer demo is available at https://qkdlite.pqcee.com 

Contact us at info@pqcee.com for more information

Author

Tan Teik Guan

Teik Guan is CEO of pQCee.com. He works in the niche area of cryptographic security design and integration, having implemented numerous successful projects for banks, government agencies and enterprises. He holds a BSc and MSc from NUS and a PhD from SUTD.

Contributors


Be first to comment
Leave a reply