Post Quantum Cryptography Securing SD WAN WP LTIMindtree
Post Quantum Cryptography Securing SD WAN WP LTIMindtree
Post-Quantum
Cryptography:
Securing SD-WANs
Table of Contents
Executive summary.................................................................................. 3
Our solution............................................................................................ 18
Conclusion.............................................................................................. 23
References.............................................................................................. 24
Authors................................................................................................... 25
Given the prevalence of Software Defined Wide Area Networks (SD-WANs) in key sectors
such as banking and insurance, it is important to migrate them to adopt PQC. We discuss
strategic and migration steps for integrating PQC into organization's complex SD-WAN
ecosystem. In partnership with Quantum Xchange, this whitepaper provides a practical
roadmap for securing SD-WANs against quantum threats, ensuring robust long-term
security and operational resilience.
https:/ www.ltimindtree.com/tech-radar/
https://crystal.ltimindtree.com/
https:/ www.ltimindtree.com/tech-radar/
Q-day, when it arrives, will immensely affect today’s systems, the internet, and applications.
Key implications include:
▪ Financial systems risk: The global financial system depends on cryptography for secure
transactions; the quantum threat could destabilize these systems and threaten economic
stability.
▪ Data harvesting risk: There's a risk that encrypted data is being collected now to be
decrypted using a CRQC later, posing privacy and security threats. This is widely referred to
as the Harvest Now, Decrypt Later (HNDL) attack.
▪ Urgency in research and development: The looming Q-day accelerates research and
development for quantum-resistant cryptographic methods to protect against quantum
attacks. Developing and implementing PQC is crucial to secure digital communications
against quantum threats.
According to a McKinsey and Company reportii, the public and financial sectors are highly
vulnerable to HNDL attacks because of the critical, long-lasting data they handle and their
extensive infrastructural lifecycles. These sectors are extremely important to the functioning of
countries and societies and must be safeguarded against any attack. Thus, the banking and
financial sectors must become aware of the quantum threats and solutions to safeguard
against these attacks.
This article focuses on SD-WANs and site-to-site VPNs used in large enterprises, like banking and
insurance, which rely on protocols like Internet Protocol Security (IPSec). IPSec uses public key
algorithms to create secure tunnels for data exchange, making it susceptible to quantum attacks
(Figure 1).
SHA-2 (384) Hashing Hash functions 128 Larger key size needed
SHA-3 (384) Hashing Hash functions 128 Larger key size needed
The PQC algorithms can be implemented on current classical computers, laptops, and
embedded devices and have no dependency on the availability of quantum computers.
August
Published 3 PQC standards
April
5 th Conference
2023
August
Draft Standards
November
In 2016, NIST began the process of 4 th Conference
quantum computers.
June
3 rd Conference
2019
This process, involving extensive
August
evaluation and competition,
2 nd Conference
culminated in August 2024 with the 2018
finalization of three key standards,
April
with a fourth algorithm expected to 1 st Conference
2017
be standardized later in the year.
December
Publish submissions
November
Submission due
▪ Security with confidence: Standardized PQC algorithms ensure resistance against known
and emerging quantum threats, increasing user confidence.
The global efforts to develop standardized PQC algorithms have received significant participation
from multiple organizations and countries, all aiming to mitigate the quantum threat. Many nations
are aligning with NIST's outcomes and are establishing their guidelines for adoption and migration.
Assessing your organization's current maturity levels of cryptographic assets and practices is
the first step in the migration process. This step starts with identifying all the cryptographic
assets in the organization. This is followed by assessing the risks of these assets for the
quantum threats. The outcome of this step will be identifying the critical and sensitive assets
that need to be secured.
Various methods can be used to identify the inventory, including questionnaires and
automated tools. Passive network scanning and analysis tools, such as Quantum Xchange’s
Cipher Insightsvii, are extremely useful in identifying all the end points that generate traffic
that does not comply with organization policies and is vulnerable to quantum threats.
Users
▪ Data shelf life (X): Determine how long your data needs to be protected. This
varies from short-term for temporary codes to long-term for sensitive data regulated
by laws or specific needs.
▪ Migration time (Y): Evaluate the time needed to switch to a new, secure encryption
method. This can be a quick change if your assets are highly crypto agile, but typical-
ly takes years to update and/or upgrade.
▪ CRQC Arrival time (Z): Estimate when CRQCs will be available.
▪ Mosca’s Theorem: Using these parameters, check if X + Y > Z, then your data and
infrastructure are no longer safe.
Years
Figure 3: Depiction of Mosca’s theorem, Future State Technical Paper, FS-ISAC, 2023 :
https://www.fsisac.com/hubfs/Knowledge/PQC/FutureState.pdf
After inventorying the cryptographic assets, the next step is selecting technology options for
upgrading the encryption levels to PQC. It’s crucial to choose solutions that support
crypto-agility to facilitate future transitions to updated cryptographic standards easily.
It is also important to emulate deployment scenarios in a small-scale sandbox. This allows the
stakeholders, like network architects, application architects, and information security teams, to
play and test the solution for various aspects ranging from integration points to interoperability
with current systems and performance impact on user experiences. Furthermore, this testing
phase helps identify and address potential challenges that may occur during full-scale
deployment.
Crypto-agility
▪ Futureproofing: As quantum computing advances, the ability to integrate newer and more
secure algorithms is crucial to adopt without major disruptions.
▪ Threat response: In the face of newly discovered vulnerabilities or attacks, the ability to
swiftly change cryptographic algorithms is vital for maintaining security.
In cryptographic systems, having a separate control channel for managing cryptographic operations
like key management, algorithm selection, and policy enforcement from the data channel is important
for several reasons.
▪ Security: Reduces the risk of a single point of failure. If the control mechanism is
compromised, the encrypted data remains secure, and vice versa.
▪ Scalability: Allows updates in control mechanisms (like policies or algorithms) without altering
the data, facilitating easier scaling.
▪ Flexibility: Enables finer control over cryptographic operations and assists in compliance
without affecting data management.
Performance integrity
Ensuring PQC solutions do not drastically compromise on performance. Quantum-resistant algorithms are
often more computationally intensive than their classical counterparts, which can impact system
efficiency. Considerations include:
▪ Processing speed: Encryption and decryption processes should not significantly slow down
system operations or user interactions.
▪ Resource utilization: PQC solutions should be resource-efficient, suitable even for devices with
limited capabilities.
▪ Scalability: The PQC solution should handle increasing demands without excessive resource
consumption or degradation of performance.
In partnership with Quantum Xchange, we offer a streamlined, scalable, and robust PQC
solution tailored for enterprise SD-WANs and site-to-site VPN networks. This solution not only
provides crypto-agility but also introduces crypto diversification, enhancing security through
features like continuous key rotation and intelligent multi-path key routing. This is achieved via
a fault-tolerant, load-balanced mesh network, where each data link employs varied
cryptographic methods — different PQCs, Quantum Key Distribution (QKD) if needed, or a
combination. Such diversity and complexity in cryptographic approaches substantially mitigate
risks, even if specific links or algorithms are compromised. Keys are generated using a
FIPS-certified method incorporating multiple randomness sources, including Quantum Random
Number Generators (QRNG), ensuring top-level security.
The solution consists of Phio TX, either in the form of physical rack mountable boxes or as a
VM image, and a Phio TX cloud, called the hive. Together, they facilitate secure key exchanges,
replacing traditional methods with more secure out-of-band key delivery via the hive. This
setup enables post-quantum secure connections across VPNs/SD-WANs in data centers and
offices, as demonstrated in a typical deployment scenario, as shown in Figure 3.
Copper
5G
Internet Router/VPN
Phio TX
Internet Phio - TX Cloud Branch Office
Headquarters
5G
Features
▪ FIPS 140-2/3 certified out-of-band key delivery: The out-of-band key delivery
using the hive is scalable, robust to single point failures, and supports various
deployment configurations (on-prem or on cloud).
▪ Crypto diverse and quantum-safe: Phio TX and the hive allow customization of
each link with user-selected NIST-finalized PQC algorithms.
Quantum-Safeguard
This service is tailored to help organizations tackle the challenges of quantum computing. We
conduct a comprehensive evaluation to identify vulnerabilities to quantum threats within your
cryptography defenses, focusing on both new projects and legacy systems.
By deeply assessing your current IT landscape, including networks, applications, and encryption
methods, we identify the best opportunities for integrating quantum-safe technologies.
Before migrating all the infrastructure to PQC, it is important to understand the possibilities,
integration points, and implications of integrating new infrastructure into your existing
systems and networks. This service is designed to recreate the scenarios of a full-scale
environment in a sandbox to understand and test the migration solutions.
We focus on the learning derived from the tests–the integration, security, and performance
issues and solutions–and take them along when scaling up. Our clients can leverage our
Quantum-Safe VPN testbed in Londonix, thereby enabling a faster PoC testing and evaluation
process.
We assist in every step of the migration to PQC. Accordingly, this service focuses on planning,
deploying, integrating, and testing Quantum Xchange’s Phio TX and hive at scale to make
your infrastructure quantum safe.
LTIMindtree will help create a strategy for migration tailormade for your organization based
on your organization's priorities and other parameters. Based on the inputs and learnings
from the QSDA and PoC stages, a plan for a smooth transition will be carefully crafted. The
optimization factors would be quick integration and deployment with minimal downtime and
disruptions to users. The integration and deployment will then follow based on the deploy-
ment model chosen (on-prem or on cloud) hive. Rigorous testing and performance tuning will
be done to ensure smooth operation in the long run.
https:/ www.ltimindtree.com/tech-radar/
i. Algorithms for quantum computation: discrete logarithms and factoring, P. W. Shor, Proceedings 35th
annual symposium on foundations of computer science, pp. 124–134, 1994:
https://search.worldcat.org/title/filter-bubble-what-the-internet-is-hiding-from-you/oclc/682892628
ii. When—and how—to prepare for post-quantum cryptography, Lennart Baumgärtner, Benjamin Klein, Niko
Mohr, Anika Pflanzer, and Henning Soller, McKinsey & Company, 4 May 2022:
https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/when-and-how-to-prepare-for-post-qu
antum-cryptography
iii. A fast quantum mechanical algorithm for database search, L. K. Grover, in Proceedings of the
twenty-eighth annual ACM symposium on Theory of computing, 1996, pp. 212–219:
hhttps://dl.acm.org/doi/10.1145/237814.237866
vii. Cyber Risk Discovery & Cryptographic Inventory, CipherInsights | Quantum Xchange:
https://quantumxc.com/cipherinsights/
ix. LTIMindtree Launches and Tests Quantum-Safe VPN Link in London in Collaboration with Quantum
Xchange & Fortinet Business Wire, Business Wire, 23 November 2023:
https://www.businesswire.com/news/home/20231122868313/en/LTIMindtree-Launches-and-Tests-Quantu
m-Safe-VPN-Link-in-London-in-Collaboration-with-Quantum-Xchange-Fortinet
Vijay is a seasoned IoT solutions architect and software engineer with a strong
track record in technology project leadership and product development. He
holds a Ph.D. in Computer Science and an M.Sc. in Telecommunications from
Delft University of Technology. His academic excellence is reflected in multiple
best-paper awards at prestigious conferences, numerous high-quality
publications, three patents, and contributions to two IEEE standards.
Mehul Gandhi,
Senior Director of Cybersecurity, LTIMindtree