Engineering & Technology
May 26, 2020

Post-quantum secure encryption and cybersecurity education

Encryption systems that are capable of surviving quantum computer attacks are urgently required, but the cybersecurity talent gap militates against securing cyberinfrastructure. Dr Aydin Aysu, Assistant Professor at North Carolina State University, is advancing the research and teaching of post-quantum secure encryption. He has developed a quantum-secure encryption system together with a new graduate program on hardware security and is currently developing design automation for lattice-based post-quantum cryptosystems

The future of cybersecurity relies on developing quantum-secure algorithms, implementing them on trusted hardware, and training cybersecurity professionals at scale. Indeed, the emergence of quantum computers places existing security standards under severe threat. New encryption systems that can survive quantum computer attacks are urgently required. At the same time, hardware attacks are a growing concern among cybersecurity exploits, particularly as reliable computing hardware is essential to all information security practices. Cryptographic operations executing in a hardware root-of-trust underpins the security guarantees in a system. If this hardware root gets compromised, the security enforcement mechanisms will fail. Finally, the supply of cybersecurity specialists capable of developing such post-quantum secure encryption system is lagging far behind the demand for expertise, creating the cybersecurity talent gap. It is anticipated that there will be 3.5 million unfilled cybersecurity positions globally by 2021, highlighting the need to train hardware security specialists to secure cyberinfrastructure.

Dr Aydin Aysu, Assistant Professor at the Department of Electrical and Computer Engineering, North Carolina State University is advancing the research and teaching of post-quantum secure encryption. In his project ‘Secure Instruction Set Extensions for Lattice-Based Post-Quantum Cryptosystems’ funded by the National Science Foundation (NSF) Computer and Information Science and Engineering (CISE) Secure and Trustworthy Cyberspace (SaTC) Research Initiation Initiative (CRII) program, Dr Aysu is developing a quantum-secure encryption system together with a new graduate program on hardware security. He explains how “existing encryption techniques are proven to be vulnerable to quantum computing because their mathematical foundations are solvable with a quantum computer”. The development of new encryption systems capable of surviving quantum computer attacks is therefore crucial. These encryption systems are still classical algorithms that can be executed on classical computer. They are founded, however, on hard mathematical problems, such as the shortest vector problem, that cannot be practically solved by any computer, be it quantum or classical.


Side-channel attacks
There is in-depth scrutiny of the theoretical analysis of post-quantum secure encryption; conversely, their implementation security is mostly uncharted. Dr Aysu points out that cryptography schemes that are mathematically sound, are still vulnerable to being attacked at the implementation level. These attacks are known as side-channel attacks.

It is anticipated that there will be 3.5 million unfilled cybersecurity positions globally by 2021.

The adversary can extract the secret key by measuring either the power consumption or electromagnetic radiation of a computer while it is executing encryption. Dr Aysu’s recent work demonstrates that the attacker can discover the entire secret key from as little as a single post-quantum encryption operation. To avoid such attacks, computers implementing post-quantum secure encryption will therefore require a countermeasure to be incorporated into the execution. The development of side-channel countermeasures is the main research objective of this CRII project.

Post-quantum encryption
Using secure multi-party computation allows Dr Aysu to achieve protection from attacks. This technique involves dividing all computations into randomised shares in such a way that prevents any individual computation having a statistical correlation with the secret key. This project will take these techniques and efficiently tune them for a variety of post-quantum encryption algorithms that are already available and develop methods for their automatic application.

The side-channel attack in real time. The power and electromagnetic measurements obtained from the quantum-secure encryption hardware leaks information about the cryptographic secret keys.

This research builds on ongoing work on post-quantum encryption that started in 2013. During this time, Dr Aysu had identified the first implementation vulnerabilities of post-quantum key exchange protocols. He also designed faster hardware for post-quantum encryption use in real-time systems, and developed efficient software for use in Internet-of-Things (IoT) devices.

Lattice-based post-quantum cryptosystems
The current research focus is enabling design automation for lattice-based post-quantum cryptosystems. These are public-key encryption schemes that employ lattice problems to enable quantum-secure alternatives of existing systems. Lattice-based cryptography is centred on some lattice-based constructions that cannot be solved efficiently and are therefore resistant to attack by both classical and quantum computers. Public-key, or asymmetric, encryption schemes use two keys: a public key to encrypt, and a private key to decrypt. It is computationally infeasible to compute the private key from the public key, so public keys can be shared freely. This allows anyone to encrypt a message using the public key, and ensures that only the owners of the private keys can decrypt content or create digital signatures.

The development of new encryption systems capable of surviving quantum computer attacks is crucial.

Automatically generate hardware designs
Encryption algorithms have a variety of arithmetic structures that require the hardware designs to be manually tuned for each setting. In addition, these applications have an assortment of throughput/area requirements, yet the hardware is designed to handle a fixed, pre-defined number of processing elements. This project will also deliver a system that can automatically generate hardware designs providing the desired parameters and throughput for a diverse range of algorithms. The publication describing this recent work won the best application paper award at the 2020 Design, Automation and Test in Europe (DATE) conference.

The future of cybersecurity relies on developing quantum-secure algorithms, implementing them on trusted hardware, and training cybersecurity professionals at scale. ra2 studio/

Cybersecurity education
An integral part of the project is the teaching of post-quantum encryption. Dr Aysu has developed an innovative graduate course on hardware security that focuses on post-quantum cryptography. The course targets students with little or no experience of cryptography or hardware vulnerabilities. This approach combines theory with practical hands-on experiments. Dr Aysu explains, “the objective of the course is to provide a breadth of understanding of hardware security and an in-depth comprehension of the implementations of cryptographic hardware, potential exploits, and associated defences.”

During their studies, students design specialised hardware accelerators for post-quantum cryptography, they execute implementation attacks, such as side-channel and fault attacks, and they build countermeasures for hardware designs. Dr Aysu recognises the challenge in covering the required concepts in, for instance, hardware design, applied cryptography, computer architectures, and statistics, yet still maintain a balance in the breadth and depth of the relevant subjects.

Course structure
The course is structured using five components. Regular lectures are given either by the instructor or an invited guest lecturer from industry or academia. These provide the breadth of topics, while the remaining elements provide students with the depth of knowledge. Students complete a set of course assignments, in which they design hardware and analyse implementation attacks/defences, which they then apply to real cryptosystems during hands-on experiments. Early in the course students select papers which they study and then present to their peers. The paper presentations cover valuable concepts that are not covered in lectures. Several students are randomly selected to review each presenter and paper, and encourage students to read the papers before their presentations. In addition, students complete their final research projects, where they tackle self-proposed open-ended problems. Towards the end of the course, students present their research projects and submit a report. A number of these projects have the potential to be turned into research papers.

Broader impacts
Disseminating publications, distributing open-source hardware and software, and bridging the research on computer architectures and hardware security are among the broader impacts of this research. Currently, secure computer architectures leave physical side-channels out of their threat model, so bridging this research is vital.

Dr Aysu also draws attention to how this research project can assist in the quantum-secure encryption standardisation, currently being led by the National Institute of Standards and Technology (NIST), by providing an evaluation of those proposals involving lattice cryptography. He believes that all university electrical and computer engineering departments should run a hardware security course. While hardware security courses are taught in some universities in the US, public information suggests that this is the only one focusing on next-generation cryptographic systems. Dr Aysu is happy to share his experience of developing this course and offers useful advice to future adopters.

Personal Response

What do you envisage as the next key development in post-quantum secure encryption?

<> There has been a barrage of algorithms for post-quantum secure encryption and they are fairly well developed. But the current state of implementations are far from mass deployment. The next key development, therefore, would be the outcome of NIST’s standardisation, which will allow cryptographic engineers to focus on the selected algorithm(s) among others and to implement them securely and efficiently on a wide-array of computing platforms.

This feature article was created with the approval of the research team featured. This is a collaborative production, supported by those featured to aid free of charge, global distribution.

Want to read more articles like this?

Sign up to our mailing list and read about the topics that matter to you the most.
Sign Up!

Leave a Reply

Your email address will not be published. Required fields are marked *