What is hybrid post-quantum encryption?

What is hybrid post-quantum encryption?

Hybrid post-quantum encryption involves combining classical key exchange algorithms with post-quantum schemes to ensure that the eventual data that is encrypted is resistant to quantum attacks. We tell you what and how it is done.

With the new NIST PQC standards freshly announced, we are now seeing a greater interest by organizations to protect data and communications against quantum harvesting attacks.

In a harvesting attack, an adversary can collect the encrypted communications happening between the customers and enterprises today (“harvesting”), and use a quantum computer to decrypt the communications sometime in the near future (“attack”). We expect sensitive data such as authentication credentials (passwords, biometric minutiae, authentication keys), financial transaction details (payee, account numbers, transaction values) and customer information to be targeted by such attacks.

But just implementing the NIST PQC algorithms is not as straight-forward. Current classical algorithms such as RSA and ECC have been tried-and-tested for several decades and we are confident they are secure against everything except quantum. On the other hand, the NIST PQC algorithms have undergone rigorous evaluation over the past 7 years and we are pretty sure they are secure against quantum, but maybe not everything else (e.g. side-channel attacks). So how do we combine the use of classical and NIST PQC algorithms to get the best of both worlds? Enter hybrid post-quantum encryption.

Hybrid post-quantum encryption involves combining classical key exchange algorithms (RSA, ECDH) with post-quantum schemes (Kyber ML-KEM, QKD) to ensure that the eventual data that is encrypted is resistant to quantum attacks. Here are 3 different hybrid approaches that we are seeing in the industry:

  • Layered (or double encryption). In the layered approach, an additional NIST PQC layer of encryption is used to encapsulate or wrap-around the the existing classical implementation. The systems that are not exposed to the public continue to operate on classical cryptography while the Internet or public facing communications get an additional protection from quantum attacks. The advantage is that multiple layers of post-quantum cryptography can be applied or removed without affecting the existing application to achieve quantum-safety. The disadvantage is that there will be increased computational and data overheads due to the additional layers. An example of layering is Apple’s quantum-safe messaging PQ3 
Apple's PQ3 post quantum  encryption uses Kyber ML-KEM (shown in orange-grey) to layer onto specific quantum-unsafe communications to ensure that the overall system remains quantum-safe. Most of the underlying classical cryptography remains unchanged.
  • Composite hybrid. The composite approach focuses on deriving an eventual session encryption key that is quantum-safe. The scheme relies on different key negotiation protocols happening first, e.g. classical ECDH, Kyber ML-KEM and QKD, and then combining all the negotiated keys into a composite key for data encryption. The advantage is that such implementations require the attacker to break all the key negotiation schemes before any compromise happens. The disadvantage is the complexity of the implementation which requires careful design of the protocol and the difficulty of a roll-back. An example of a composite hybrid implementation is BSI’s article on Quantum-Safe Cryptography
In BSI's hybrid scheme, a key derivation function (KDF) is used to combine different transient keys obtained from various sources such as classical key exchange, post-quantum key exchange and/or quantum key distribution to arrive at a hybrid key which is eventually used as the actual session encryption key.
  • Interoperable Hybrid. For interoperability and system compatibility, some implementations choose to implement NIST PQC in parallel to classical cryptography. The choice to use either classical and/or NIST PQC happens during the actual use of the application. The goal is to ease the transition into post-quantum cryptography without a big-bang migration approach. The disadvantages are that not all communications are guaranteed to be quantum-safe (since a classical-only option still exists) and a second migration needs to take place to remove out the classical option. An example of such an implementation is Google’s post-quantum support in the Chrome browser
Extract from chrome://flags. Although Kyber support is turned on by default in the Chrome browser, quantum-safe encryption is not enforced and dependent on the TLS negotiation between the browser and webserver.

So what is the best approach? We provide a table comparing the schemes below:

Hybrid SchemeLayeredCompositeInteroperable
AdvantageExisting application is unchanged, making rollbacks easierMost secure if implemented correctlyPartial rollouts are possible where some users are using PQC algorithms while others remain on the classical algorithms
DisadvantageAdditional overheads on data and processing.Complex in the design and implementation. Difficult to rollback. Least crypto-agile.Not all communication is  quantum-safe. Requires a second migration to remove the classical option
FocusBalance between security, ease of implementation and rollbackSecurity. All key negotiation algorithms need to be broken at compromisePilots can be carried out in real-life deployments without affecting most users.
Crypto-agility At implementationAt designAt use
RecommendationBest for standalone applications  whose data exposure is well understoodBest for industry-wide protocols which are require multiple parties to participate in the design and implementationBest for experimentation where many of the factors are still unknown or not within your control

So there you have it. The next time you hear about hybrid post-quantum encryption, find out what is the underlying scheme and decide if it is appropriate for you. Post-quantum security is here to stay and can already be implemented. Stay tuned for the next topic on hybrid post-quantum digital signing.

If you are interested in this topic, pQCee has several product offerings such as inoQulateSafeQuard and QKDLite that can help you in the hybrid post-quantum encryption journey. 

Author

Tan Teik Guan

Teik Guan is CEO of pQCee.com. He works in the niche area of cryptographic security design and integration, having implemented numerous successful projects for banks, government agencies and enterprises. He holds a BSc and MSc from NUS and a PhD from SUTD.

Be first to comment

Leave a reply