Inhaltsverzeichnis

1.2 Security

Threat model and security aspects of post-quantum cryptography.


The Quantum Threat

Harvest Now, Decrypt Later (HNDL)

The Scenario:

  1. Attackers intercept encrypted data today
  2. Store it for years/decades
  3. Decrypt it with a future quantum computer

Affected Algorithms:

Timeline:


Why Hybrid?

Hybrid cryptography provides:

Hybrid Certificate:
+-- RSA-4096 Signature (classical)
+-- ML-DSA-65 Signature (PQ, in X.509 extension)

Validation:
+-- Legacy client: Verifies only RSA [check]
+-- Modern client: Verifies RSA + ML-DSA [check][check]

Best Practices

For Developers

For Administrators

For Organizations


Known Limitations

Limitation Description Workaround
Windows Store No native PQ keys Side-store is used
Argon2id OpenSSL 3.6 experimental Fallback to PBKDF2
Custom OIDs Not yet IANA-registered Will be updated upon standardization
WASM Performance 10-100x slower than native Suitable for interactive use

Security Notes

DLL Sideloading Risk: Ensure OpenSSL DLLs come from a trusted source and the path is correctly configured.

PQ Key Backup: The PQ key store is not included in Windows Certificate Store backup. Separate backup required!


Further Reading


Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional