PING

Post-Quantum Cryptography


Listen Later

In the last episode of PING for 2024, APNIC’s Chief Scientist Geoff Huston discusses the shift from existing public-private key cryptography using the RSA and ECC algorithms to the world of ‘Post Quantum Cryptography. These new algorithms are designed to withstand potential attacks from large-scale quantum computers and are capable of implementing Shor’s algorithm, a theoretical approach for using quantum computing to break the cryptographic keys of RSA and ECC.


Standards agencies like NIST are pushing to develop algorithms that are both efficient on modern hardware and resistant to the potential threats posed by Shor’s Algorithm in future quantum computers. This urgency stems from the need to ensure ‘perfect forward secrecy’ for sensitive data — meaning that information encrypted today remains secure and undecipherable even decades into the future.


To date, maintaining security has been achieved by increasing the recommended key length as computing power improved under Moore’s Law, with faster processors and greater parallelism. However, quantum computing operates differently and will be capable of breaking the encryption of current public-private key methods, regardless of the key length.


Public-private keys are not used to encrypt entire messages or datasets. Instead, they encrypt a temporary ‘ephemeral’ key, which is then used by a symmetric algorithm to secure the data. Symmetric key algorithms (where the same key is used for encryption and decryption) are not vulnerable to Shor’s Algorithm. However, if the symmetric key is exchanged using RSA or ECC — common in protocols like TLS and QUIC when parties lack a pre-established way to share keys — quantum computing could render the protection ineffective. A quantum computer could intercept and decrypt the symmetric key, compromising the entire communication.


Geoff raises concerns that while post-quantum cryptography is essential for managing risks in many online activities — especially for protecting highly sensitive or secret data—it might be misapplied to DNSSEC. In DNSSEC, public-private keys are not used to protect secrets but to ensure the accuracy of DNS data in real-time.


If there’s no need to worry about someone decoding these keys 20 years from now, why invest significant effort in adapting DNSSEC for a post-quantum world? Instead, he questions whether simply using longer RSA or ECC keys and rotating key pairs more frequently might be a more practical approach.


Read more about Post-Quantum Cryptography and DNSSEC on the APNIC blog and the web.

  • Post-Quantum Cryptography (Geoff Huston, APNIC Blog November 2024)
  • [Podcast] Testing Post-Quantum Cryptography DNSSEC (Podcast July 2024)
  • A quantum-safe cryptography DNSSEC testbed (Caspar Schutijser, APNIC Blog 2024)
  • [Podcast] The SIDN Labs post-quantum DNSSEC testbed (Podcast August 2024)
  • Quantum Computing and the DNS (Paul Hoffman, office of the CTO, ICANN April 2024)


PING will return in early 2025

This is the last episode of PING for 2024, we hope you’ve enjoyed listening. The first episode of our new series is expected in late January 2025. In the meantime, catch up on all past episodes.

...more
View all episodesView all episodes
Download on the App Store

PINGBy APNIC

  • 5
  • 5
  • 5
  • 5
  • 5

5

4 ratings


More shows like PING

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,963 Listeners

Radiolab by WNYC Studios

Radiolab

43,836 Listeners

Risky Business by Patrick Gray

Risky Business

361 Listeners

The Amp Hour Electronics Podcast by The Amp Hour (Chris Gammell and David L Jones)

The Amp Hour Electronics Podcast

230 Listeners

The Talk Show With John Gruber by Daring Fireball / John Gruber

The Talk Show With John Gruber

3,115 Listeners

Network Break by Packet Pushers

Network Break

101 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,816 Listeners

IPv6 Buzz by Packet Pushers

IPv6 Buzz

33 Listeners

The Hedge by Russ White

The Hedge

15 Listeners

Ctrl+Alt+Azure by Tobias Zimmergren, Jussi Roine

Ctrl+Alt+Azure

12 Listeners

The Art of Network Engineering by Andy and friends

The Art of Network Engineering

81 Listeners

Flyvende tallerken by DR

Flyvende tallerken

30 Listeners

The Weekly Show with Jon Stewart by Comedy Central

The Weekly Show with Jon Stewart

10,221 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners

Oxide and Friends by Oxide Computer Company

Oxide and Friends

47 Listeners