The information contained herein may be confidential and privileged attorney-client information or work product intended only for the individuals or entity to whom it is addressed. Any unauthorized use, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify me immediately. --
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/e935a1ae-657a-464b-9629-9421834794ddn%40list.nist.gov.
+1 to this point:
> It completely ignores the fact that in every commercial device you can think of, all of that SW depends entirely on some foundational, immutable hardware and ROM for all of its security.
> If this foundational security is compromised by a working quantum computer, you can update your software until you are blue in the face, but it doesn't change the fact that your systems are irrevocably, irreparably, foundationally broken.
The buzzword “Harvest-Now-Decrypt-Later” has gained media attention. I’d like to propose the buzzword “Trust-Now-Forge-Later” as the signatures equivalent, which covers cases like this one where choice of which roots to trust is set at manufacture-time and cannot be field-updated … or where the update mechanism itself becomes totally compromised at Q-Day.
---
Mike Ounsworth
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CABNwLcumeVshpFXPMa%2B17boX564duko9xc4SjA_iU5-HbiHLmA%40mail.gmail.com.
> It completely ignores the fact that in every commercial device you can think of, all of that SW depends entirely on some foundational, immutable hardware and ROM for all of its security.
> If this foundational security is compromised by a working quantum computer, you can update your software until you are blue in the face, but it doesn't change the fact that your systems are irrevocably, irreparably, foundationally broken.
The buzzword “Harvest-Now-Decrypt-Later” has gained media attention. I’d like to propose the buzzword “Trust-Now-Forge-Later” as the signatures equivalent, which covers cases like this one where choice of which roots to trust is set at manufacture-time and cannot be field-updated … or where the update mechanism itself becomes totally compromised at Q-Day.
Majority of the readers thing of “sign/trust now” as “authenticate now, and it’s pointless to forge today’s session after 10 years”.
Yes, software/firmware updates is probably the only exception to the above – though again, installing firmware with forged signature of 2025 on a computer in 2035 does not sound extremely plausible (albeit not as impossible as spoofing my TLS session of last year 😉).
Uri,
> Majority of the readers thing of “sign/trust now” as “authenticate now, and it’s pointless to forge today’s session after 10 years”.
Right, exactly. Hence “Trust Now” not “Sign Now”. Emphasis on the fact that this applies to cases where you have to make some long-term root-of-trust decision now.
> though again, installing firmware with forged signature of 2025 on a computer in 2035 does not sound extremely plausible
I have an ePassport with a 10 year life that begs to differ.
I have customers with satellites in orbit who would beg to differ.
I have HSM hardware on a 10-year replacement cycle that would beg to differ.
Etc.
Even if these things have field-updatable trust stores, this A) introduces extra security concern compared with immutable trust stores, so immutable is a defensible design choice, and B) you have to assume that all things are able to obtain an update before Q-Day, which is also not guaranteed.
---
Mike Ounsworth
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/1A563580-38EA-489B-AB57-C4DFD0AB553C%40symbolic.software.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/4990E9FF-37B1-414F-BF1E-EF70B48B8360%40symbolic.software.
AWS claims its HSM supports PQC. It may be used as an example.
Hi Tim,
When you say “FIPS 140-3 validated PQC” are you referring to the
device having completed the FIPS certification process completely,
or is it sufficient to be in the MIP queue for FIPS 140-3 certification
with ACVP certification of the PQC components of the device?
If it’s the former then I don’t think you’ll find an example device
given the first availability of PQC CAVP certification was last
August and it’s ~18 months to get through the MIP queue.
If it’s the latter then I’ll mention the Crypto4A QxHSM and QxEDGE
devices which use the QASM module that was submitted to the
MIP queue in March 2025, and which has been fully certified for
all NIST PQC algorithms (see CAVP certificate A5631).
Furthermore, this device also uses quantum-safe roots of trust based
on HSS (it’s actually a hybrid root of HSS and ECDSA) to provide a
true quantum-safe update process which has been in place since the
first device was manufactured 7 years ago, so at no point has it
ever been reliant on only classic cryptographic algorithms (i.e.,
RSA and/or ECC).
Take care.
Jim
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
Hi Tim,
When you say “FIPS 140-3 validated PQC” are you referring to the
device having completed the FIPS certification process completely,
or is it sufficient to be in the MIP queue for FIPS 140-3 certification
with ACVP certification of the PQC components of the device?
+1 to this point:
> It completely ignores the fact that in every commercial device you can think of, all of that SW depends entirely on some foundational, immutable hardware and ROM for all of its security.
> If this foundational security is compromised by a working quantum computer, you can update your software until you are blue in the face, but it doesn't change the fact that your systems are irrevocably, irreparably, foundationally broken.
The buzzword “Harvest-Now-Decrypt-Later” has gained media attention. I’d like to propose the buzzword “Trust-Now-Forge-Later”
Moreover, I don't think we can rely on a "warning time window" at the beginning of which we know that a QRQC will exist at the end of that window. In other words: simply waiting for the public information of the existence of a QRQC means running into the situation where authentication will become vulnerable. (Even ignoring any update delay, which might well add at least a few years of delay in many cases, as was discussed.)
Falko
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CH0PR11MB57399FBC7DA3B8CAD46CFD9A9F57A%40CH0PR11MB5739.namprd11.prod.outlook.com.
MTG
AG
Dr. Falko Strenzke
Phone: +49
6151 8000 24
E-Mail: falko.s...@mtg.de
Web: mtg.de
MTG AG - Dolivostr. 11 - 64293 Darmstadt, Germany
Commercial register: HRB 8901
Register Court: Amtsgericht Darmstadt
Management Board: Jürgen Ruf (CEO), Tamer Kemeröz
Chairman of the Supervisory Board: Dr. Thomas Milde
This email may contain confidential and/or privileged
information. If you are not the correct recipient or have
received this email in error,
please inform the sender immediately and delete this
email.Unauthorised copying or distribution of this email is
not permitted.
Data protection information: Privacy policy