This is the fifth in a multi-part series on cryptography and the Domain Name System (DNS).
In my last article, I described efforts underway to standardize new cryptographic algorithms that are designed to be less vulnerable to potential future advances in quantum computing. I also reviewed operational challenges to be considered when adding new algorithms to the DNS Security Extensions (DNSSEC).
In this post, I'll look at hash-based signatures, a family of post-quantum algorithms that could be a good match for DNSSEC from the perspective of infrastructure stability.
I'll also describe Verisign Labs research into a new concept called synthesized zone signing keys that could mitigate the impact of the large signature size for hash-based signatures, while still maintaining this family's protections against quantum computing.
(Caveat: The concepts reviewed in this post are part of Verisign's long-term research program and do not necessarily represent Verisign's plans or positions on new products or services. Concepts developed in our research program may be subject to U.S. and/or international patents and/or patent applications.)
The DNS community's root key signing key (KSK) rollover illustrates how complicated a change to DNSSEC infrastructure can be. Although successfully accomplished, this change was delayed by ICANN to ensure that enough resolvers had the public key required to validate signatures generated with the new root KSK private key.
Now imagine the complications if the DNS community also had to ensure that enough resolvers not only had a new key but also had a brand-new algorithm.
Imagine further what might happen if a weakness in this new algorithm were to be found after it was deployed. While there are procedures for emergency key rollovers, emergency algorithm rollovers would be more complicated, and perhaps controversial as well if a clear successor algorithm were not available.
I'm not suggesting that any of the post-quantum algorithms that might be standardized by NIST will be found to have a weakness. But confidence in cryptographic algorithms can be gained and lost over many years, sometimes decades.
From the perspective of infrastructure stability, therefore, it may make sense for DNSSEC to have a backup post-quantum algorithm built in from the start one for which cryptographers already have significant confidence and experience. This algorithm might not be as efficient as other candidates, but there is less of a chance that it would ever need to be changed. This means that the more efficient candidates could be deployed in DNSSEC with the confidence that they have a stable fallback. It's also important to keep in mind that the prospect of quantum computing is not the only reason system developers need to be considering new algorithms from time to time. As public-key cryptography pioneer Martin Hellman wisely cautioned, new classical (non-quantum) attacks could also emerge, whether or not a quantum computer is realized.
The 1970s were a foundational time for public-key cryptography, producing not only the RSA algorithm and the Diffie-Hellman algorithm (which also provided the basic model for elliptic curve cryptography), but also hash-based signatures, invented in 1979 by another public-key cryptography founder, Ralph Merkle.
Hash-based signatures are interesting because their security depends only on the security of an underlying hash function.
It turns out that hash functions, as a concept, hold up very well against quantum computing advances much better than currently established public-key algorithms do.
This means that Merkle's hash-based signatures, now more than 40 years old, can rightly be considered the oldest post-quantum digital signature algorithm.
If it turns out that an individual hash function doesn't hold up whether against a quantum computer or a classical computer then the hash function itself can be replaced, as cryptographers have been doing for years. That will likely be easier than changing to an entirely different post-quantum algorithm, especially one that involves very different concepts.
The conceptual stability of hash-based signatures is a reason that interoperable specifications are already being developed for variants of Merkle's original algorithm. Two approaches are described in RFC 8391, "XMSS: eXtended Merkle Signature Scheme" and RFC 8554, "Leighton-Micali Hash-Based Signatures." Another approach, SPHINCS+, is an alternate in NIST's post-quantum project.
Figure 1. Conventional DNSSEC signatures. DNS records are signed with the ZSK private key, and are thereby "chained" to the ZSK public key. The digital signatures may be hash-based signatures.
Hash-based signatures can potentially be applied to any part of the DNSSEC trust chain. For example, in Figure 1, the DNS record sets can be signed with a zone signing key (ZSK) that employs a hash-based signature algorithm.
The main challenge with hash-based signatures is that the signature size is large, on the order of tens or even hundreds of thousands of bits. This is perhaps why they haven't seen significant adoption in security protocols over the past four decades.
Verisign Labs has been exploring how to mitigate the size impact of hash-based signatures on DNSSEC, while still basing security on hash functions only in the interest of stable post-quantum protections.
One of the ideas we've come up with uses another of Merkle's foundational contributions: Merkle trees.
Merkle trees authenticate multiple records by hashing them together in a tree structure. The records are the "leaves" of the tree. Pairs of leaves are hashed together to form a branch, then pairs of branches are hashed together to form a larger branch, and so on. The hash of the largest branches is the tree's "root." (This is a data-structure root, unrelated to the DNS root.)
Each individual leaf of a Merkle tree can be authenticated by retracing the "path" from the leaf to the root. The path consists of the hashes of each of the adjacent branches encountered along the way.
Authentication paths can be much shorter than typical hash-based signatures. For instance, with a tree depth of 20 and a 256-bit hash value, the authentication path for a leaf would only be 5,120 bits long, yet a single tree could authenticate more than a million leaves.
Figure 2. DNSSEC signatures following the synthesized ZSK approach proposed here. DNS records are hashed together into a Merkle tree. The root of the Merkle tree is published as the ZSK, and the authentication path through the Merkle tree is the record's signature.
Returning to the example above, suppose that instead of signing each DNS record set with a hash-based signature, each record set were considered a leaf of a Merkle tree. Suppose further that the root of this tree were to be published as the ZSK public key (see Figure 2). The authentication path to the leaf could then serve as the record set's signature.
The validation logic at a resolver would be the same as in ordinary DNSSEC:
The only difference on the resolver's side would be that signature validation would involve retracing the authentication path to the ZSK public key, rather than a conventional signature validation operation.
The ZSK public key produced by the Merkle tree approach would be a "synthesized" public key, in that it is obtained from the records being signed. This is noteworthy from a cryptographer's perspective, because the public key wouldn't have a corresponding private key, yet the DNS records would still, in effect, be "signed by the ZSK!"
In this type of DNSSEC implementation, the Merkle tree approach only applies to the ZSK level. Hash-based signatures would still be applied at the KSK level, although their overhead would now be "amortized" across all records in the zone.
In addition, each new ZSK would need to be signed "on demand," rather than in advance, as in current operational practice.
This leads to tradeoffs, such as how many changes to accumulate before constructing and publishing a new tree. Fewer changes and the tree will be available sooner. More changes and the tree will be larger, so the per-record overhead of the signatures at the KSK level will be lower.
My last few posts have discussed cryptographic techniques that could potentially be applied to the DNS in the long term or that might not even be applied at all. In my next post, I'll return to more conventional subjects, and explain how Verisign sees cryptography fitting into the DNS today, as well as some important non-cryptographic techniques that are part of our vision for a secure, stable and resilient DNS.
Read the previous posts in this six-part blog series:
View post:
- The Quantum Computer Revolution Is Closer Than You May Think - National Review [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Time Crystals Could be the Key to the First Quantum Computer - TrendinTech [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- quantum computing - WIRED UK [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Chinese scientists build world's first quantum computing machine - India Today [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Here's How We Can Achieve Mass-Produced Quantum Computers - ScienceAlert [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- D-Wave partners with U of T to move quantum computing along - Financial Post [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Team develops first blockchain that can't be hacked by quantum computer - Siliconrepublic.com [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Telstra just wants a quantum computer to offer as-a-service - ZDNet [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Research collaborative pursues advanced quantum computing - Phys.Org [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Quantum Computing Market Forecast 2017-2022 | Market ... [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Quantum Computing Is Real, and D-Wave Just Open ... - WIRED [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- FinDEVr London: Preparing for the Dark Side of Quantum Computing - GlobeNewswire (press release) [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Purdue, Microsoft to Collaborate on Quantum Computer - Photonics.com [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Scientists May Have Found a Way to Combat Quantum Computer Blockchain Hacking - Futurism [Last Updated On: June 9th, 2017] [Originally Added On: June 9th, 2017]
- Microsoft and Purdue work on scalable topological quantum computer - Next Big Future [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- HYPRES Expands Efforts in Quantum Computing with Launch of European Subsidiary SeeQC - Business Wire (press release) [Last Updated On: June 12th, 2017] [Originally Added On: June 12th, 2017]
- From the Abacus to Supercomputers to Quantum Computers - Duke Today [Last Updated On: June 13th, 2017] [Originally Added On: June 13th, 2017]
- Accenture, Biogen, 1QBit Launch Quantum Computing App to ... - HIT Consultant [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- The US and China "Quantum Computing Arms Race" Will Change Long-Held Dynamics in Commerce, Intelligence ... - PR Newswire (press release) [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- Quantum Computing Technologies markets will reach $10.7 billion by 2024 - PR Newswire (press release) [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- A Hybrid of Quantum Computing and Machine Learning Is Spawning New Ventures - IEEE Spectrum [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- KPN CISO details Quantum computing attack dangers - Mobile World Live [Last Updated On: June 16th, 2017] [Originally Added On: June 16th, 2017]
- Get ahead in quantum computing AND attract Goldman Sachs - eFinancialCareers [Last Updated On: June 16th, 2017] [Originally Added On: June 16th, 2017]
- Accenture, 1QBit partner for drug discovery through quantum ... - ZDNet [Last Updated On: June 16th, 2017] [Originally Added On: June 16th, 2017]
- Toward optical quantum computing - MIT News [Last Updated On: June 17th, 2017] [Originally Added On: June 17th, 2017]
- Quantum computing, the machines of tomorrow | The Japan Times - The Japan Times [Last Updated On: June 17th, 2017] [Originally Added On: June 17th, 2017]
- Its time to decide how quantum computing will help your ... [Last Updated On: June 18th, 2017] [Originally Added On: June 18th, 2017]
- Israel Enters Quantum Computer Race, Placing Encryption at Ever-Greater Risk - Sputnik International [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Prototype device enables photon-photon interactions at room ... - Phys.Org [Last Updated On: June 20th, 2017] [Originally Added On: June 20th, 2017]
- Dow and 1QBit Announce Collaboration Agreement on Quantum Computing - Business Wire (press release) [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Imperfect crystals may be perfect storage method for quantum computing - Digital Trends [Last Updated On: June 21st, 2017] [Originally Added On: June 21st, 2017]
- Dow Chemical, 1QBit Ink Quantum Computing Development Deal - Zacks.com [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- Google on track for quantum computer breakthrough by end of 2017 - New Scientist [Last Updated On: June 22nd, 2017] [Originally Added On: June 22nd, 2017]
- USC to lead project to build super-speedy quantum computers - USC News [Last Updated On: June 24th, 2017] [Originally Added On: June 24th, 2017]
- The Quantum Computer Factory That's Taking on Google and IBM ... - WIRED [Last Updated On: June 24th, 2017] [Originally Added On: June 24th, 2017]
- The weird science of quantum computing, communications and encryption - C4ISR & Networks [Last Updated On: June 27th, 2017] [Originally Added On: June 27th, 2017]
- Multi-coloured photons in 100 dimensions may make quantum ... - Cosmos [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Global Quantum Computing Market Growth at a CAGR of 35.12 ... - PR Newswire (press release) [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Qudits: The Real Future of Quantum Computing? - IEEE Spectrum - IEEE Spectrum [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- New method could enable more stable and scalable quantum ... - Phys.Org [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Quantum computers are about to get real | Science News - Science News Magazine [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Quantum Computing - Scientific American [Last Updated On: June 30th, 2017] [Originally Added On: June 30th, 2017]
- Australia's ambitious plan to win the quantum race - ZDNet [Last Updated On: July 3rd, 2017] [Originally Added On: July 3rd, 2017]
- How quantum mechanics can change computing - The Conversation - The Conversation US [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- UNSW joins with government and business to keep quantum computing technology in Australia - The Australian Financial Review [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- UNSW launches Australia's first hardware quantum computing company with investments from federal and NSW ... - OpenGov Asia [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- Finns chill out quantum computers with qubit refrigerator to cut out errors - ZDNet [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- Hype and cash are muddying public understanding of quantum ... - The Conversation AU [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- IEEE Approves Standards Project for Quantum Computing ... - insideHPC [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- Silicon Quantum Computing launched to commercialise UNSW ... - ZDNet [Last Updated On: August 24th, 2017] [Originally Added On: August 24th, 2017]
- The Era of Quantum Computing Is Here. Outlook: Cloudy ... [Last Updated On: January 30th, 2018] [Originally Added On: January 30th, 2018]
- The Era of Quantum Computing Is Here. Outlook: Cloudy | WIRED [Last Updated On: February 6th, 2018] [Originally Added On: February 6th, 2018]
- Quantum computing in the NISQ era and beyond [Last Updated On: February 6th, 2018] [Originally Added On: February 6th, 2018]
- What is quantum computing? - Definition from WhatIs.com [Last Updated On: February 6th, 2018] [Originally Added On: February 6th, 2018]
- Quantum computers - WIRED UK [Last Updated On: February 19th, 2018] [Originally Added On: February 19th, 2018]
- Is Quantum Computing an Existential Threat to Blockchain ... [Last Updated On: February 21st, 2018] [Originally Added On: February 21st, 2018]
- What is Quantum Computing? Webopedia Definition [Last Updated On: March 25th, 2018] [Originally Added On: March 25th, 2018]
- Quantum Computing Explained - WIRED UK [Last Updated On: April 15th, 2018] [Originally Added On: April 15th, 2018]
- Quantum computing: A simple introduction - Explain that Stuff [Last Updated On: June 2nd, 2018] [Originally Added On: June 2nd, 2018]
- What are quantum computers and how do they work? WIRED ... [Last Updated On: June 22nd, 2018] [Originally Added On: June 22nd, 2018]
- How Quantum Computers Work [Last Updated On: July 22nd, 2018] [Originally Added On: July 22nd, 2018]
- The reality of quantum computing could be just three years ... [Last Updated On: September 12th, 2018] [Originally Added On: September 12th, 2018]
- The 3 Types of Quantum Computers and Their Applications [Last Updated On: November 24th, 2018] [Originally Added On: November 24th, 2018]
- Quantum Computing - VLAB [Last Updated On: January 27th, 2019] [Originally Added On: January 27th, 2019]
- Quantum Computing | Centre for Quantum Computation and ... [Last Updated On: January 27th, 2019] [Originally Added On: January 27th, 2019]
- Microsofts quantum computing network takes a giant leap ... [Last Updated On: March 7th, 2019] [Originally Added On: March 7th, 2019]
- IBM hits quantum computing milestone, may see 'Quantum ... [Last Updated On: March 7th, 2019] [Originally Added On: March 7th, 2019]
- Quantum technology - Wikipedia [Last Updated On: March 13th, 2019] [Originally Added On: March 13th, 2019]
- Quantum Computing | D-Wave Systems [Last Updated On: April 18th, 2019] [Originally Added On: April 18th, 2019]
- Microsoft will open-source parts of Q#, the programming ... [Last Updated On: May 7th, 2019] [Originally Added On: May 7th, 2019]
- What Is Quantum Computing? The Complete WIRED Guide | WIRED [Last Updated On: May 8th, 2019] [Originally Added On: May 8th, 2019]
- The five pillars of Edge Computing -- and what is Edge computing anyway? - Information Age [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- Moore's Law Is Dying. This Brain-Inspired Analogue Chip Is a Glimpse of What's Next - Singularity Hub [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- Experts Gather at Fermilab for International Workshop on Cryogenic Electronics for Quantum Systems - Quantaneo, the Quantum Computing Source [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- Princeton announces initiative to propel innovations in quantum science and technology - Princeton University [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- Detecting Environmental 'Noise' That Can Damage The Quantum State of Qubits - In Compliance [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- Quantum Computing beginning talks with clients on its quantum asset allocation application - Proactive Investors USA & Canada [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- What is quantum computing? The next era of computational evolution, explained - Digital Trends [Last Updated On: October 1st, 2019] [Originally Added On: October 1st, 2019]
- IT sees the Emergence of Quantum Computing as a Looming Threat to Keeping Valuable Information Confidential - Quantaneo, the Quantum Computing Source [Last Updated On: October 23rd, 2019] [Originally Added On: October 23rd, 2019]
- More wrong answers get quantum computers to find the right one - Futurity: Research News [Last Updated On: October 23rd, 2019] [Originally Added On: October 23rd, 2019]