Inhaltsverzeichnis

2.3 Strategy & Technology

Strategic planning and technology decisions for post-quantum cryptography.


Migration Phases

        Phase 1         Phase 2         Phase 3         Phase 4
        -------         -------         -------         -------
        Preparation     Hybrid          Validation      PQ-Only

Today --------------------------------------------------------------------------> Future

        Install         New certs       Validate        PQ only
        library         hybrid          both sigs       (optional)

Phase 1: Preparation

Activities:

Result: Library installed, in Classic mode (no behavior change)


Phase 2: Enable Hybrid

Activities:

Result: New certificates are PQ-protected, old ones continue to work


Phase 3: Validation

Activities:

Result: Full hybrid validation active


Phase 4: PQ-Only (optional)

Prerequisite: All systems PQ-capable

Activities:

Note: For most organizations, Phase 3 is sufficient.


Prioritization

Priority Systems Rationale
1 (immediate) Long-term archives, contracts Highest protection requirement
2 (short-term) PKI, certificate infrastructure Foundation for other systems
3 (medium-term) APIs, web services Ongoing communication
4 (later) Internal systems Lower interception risk

Technology Decisions

Why OpenSSL 3.6?

Criterion OpenSSL 3.6 Alternatives
FIPS Validation FIPS 140-3 validatable Bouncy Castle: No FIPS
PQ Algorithms ML-DSA, ML-KEM native liboqs: Experimental
Maintenance OpenSSL Foundation, long-term Small teams, uncertain
Performance Hardware-optimized (AES-NI, AVX) Often pure software

Why AES-256-GCM?

Criterion AES-256-GCM ChaCha20-Poly1305
FIPS Certification FIPS 197 (standard) Not FIPS-certified
Hardware Support AES-NI on all CPUs No hardware acceleration
PQ Security 128-bit post-quantum 128-bit post-quantum

Why Hybrid instead of PQ-Only?

Aspect Hybrid (recommended) PQ-Only
Risk Minimal - two security layers Higher - only PQ algorithms
Compatibility Legacy systems work Breaks legacy
NIST Recommendation Recommended for transition Only after migration

Summary for Audits

Decision Rationale Reference
OpenSSL 3.6 FIPS-validatable, industry standard OpenSSL Foundation
AES-256-GCM FIPS 197 certified, hardware-accelerated NIST FIPS 197
ML-DSA/ML-KEM NIST standardized (FIPS 203/204) NIST PQC Project
Hybrid mode NIST/BSI recommended, defensive NIST SP 800-227

Success Factors


Further Reading


Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional