Scenarios: 6
FFI Functions: ~45
Status: ⏳ Planned
This category encompasses all scenarios for building and managing a Post-Quantum-capable Public Key Infrastructure (PKI). From creating a Root CA through multi-tier CA hierarchies to configuring revocation services (CRL/OCSP).
| ID | Scenario | Description | Complexity | Status |
|---|---|---|---|---|
| 1.1 | Create Root CA | Self-signed Root CA with ML-DSA-65 | ⭐⭐⭐⭐ | ⏳ |
| 1.2 | Create Intermediate CA | Subordinate CA signed by Root | ⭐⭐⭐ | ⏳ |
| 1.3 | Build CA Hierarchy | Multi-tier PKI structure | ⭐⭐⭐⭐ | ⏳ |
| 1.4 | Configure Trust Store | Manage trusted CAs | ⭐⭐ | ⏳ |
| 1.5 | Define Certificate Policy | Establish issuance policies | ⭐⭐⭐ | ⏳ |
| 1.6 | CRL/OCSP Infrastructure | Set up revocation services | ⭐⭐⭐⭐ | ⏳ |
Different requirements for PKI lifetimes and compliance apply depending on the industry:
| Industry | Root CA Validity | Specifics | Regulation |
|---|---|---|---|
| Energy/SCADA | 25 Years | Wind turbine lifetime, offline CRL | NIS21), KRITIS-VO |
| Healthcare | 20 Years | gematik OIDs, ePA compatible | GDPR Art. 32, DiGAV |
| Automotive | 30 Years | V2X PKI, pseudonym certificates | UN R1552), ISO 21434 |
| Industry 4.0 | 20 Years | OT/IT separation, IEC 62443 | NIS2, Machine Regulation |
| Standard IT | 15 Years | Standard enterprise PKI | BSI IT-Grundschutz |
| CA Type | Recommended Algorithm | Validity | Rationale |
|---|---|---|---|
| Root CA | ML-DSA-65 or ML-DSA-87 | 15-25 Years | Highest security, rarely used |
| Intermediate CA | ML-DSA-65 | 8-12 Years | Balance security/performance |
| OCSP Responder | ML-DSA-44 | 1-3 Years | Frequent signing, performance critical |
Hybrid Recommendation: For the transition phase, hybrid keys (ECDSA P-384 + ML-DSA-65) can be used to ensure compatibility with classical systems.
| Extension | Value | Critical |
|---|---|---|
| Basic Constraints | CA=true, pathLen=1 or 2 | ✅ Yes |
| Key Usage | keyCertSign, cRLSign | ✅ Yes |
| Subject Key Identifier | SHA-256(publicKey) | ❌ No |
| Extension | Value | Critical |
|---|---|---|
| Basic Constraints | CA=true, pathLen=0 | ✅ Yes |
| Key Usage | keyCertSign, cRLSign | ✅ Yes |
| Subject Key Identifier | SHA-256(publicKey) | ❌ No |
| Authority Key Identifier | SKI of Root CA | ❌ No |
| CRL Distribution Points | URL to CRL | ❌ No |
| Authority Info Access | OCSP URL, CA Issuers URL | ❌ No |
| Certificate Policies | Policy OID | ❌ No |
Critical Requirements for CA Operation:
Never:
using WvdS.Security.Cryptography.X509Certificates.Extensions.PQ; using var ctx = PqCryptoContext.Initialize(); // Root CA with ML-DSA-65 using var rootKey = ctx.GenerateKeyPair(PqAlgorithm.MlDsa65); var rootDn = new DnBuilder().AddCN("My Root CA").AddO("My Org").AddC("DE").Build(); using var rootCert = ctx.CreateRootCertificate(rootKey, rootDn, validYears: 20, extensions: new ExtBuilder() .BasicConstraints(ca: true, pathLen: 1) .KeyUsage(KeyUsageFlags.KeyCertSign | KeyUsageFlags.CrlSign) .SubjectKeyIdentifier(rootKey) .Build() ); // Save File.WriteAllText("root-ca.crt.pem", rootCert.ToPem()); File.WriteAllText("root-ca.key.pem", rootKey.ToEncryptedPem("SecurePassword123!"));
→ Complete example: Scenario 1.1
| Category | Relationship |
|---|---|
| 2. CSR | CSR creation for Intermediate CAs |
| 3. Issue Certificates | Sign end-entity certificates from CA |
| 5. Validation | Validate certificates against trust store |
| 6. Revocation | CRL/OCSP operations |
| 11. Key Management | Manage, rotate, destroy CA keys |
« ← Scenarios Overview | 1.1 Create Root CA → »
Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional