Re: [Qirg] QKD in OpenSSL

Rodney Van Meter <rdv@sfc.wide.ad.jp> Mon, 18 November 2019 06:00 UTC

Return-Path: <rdv@sfc.wide.ad.jp>
X-Original-To: qirg@ietfa.amsl.com
Delivered-To: qirg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5601C120891 for <qirg@ietfa.amsl.com>; Sun, 17 Nov 2019 22:00:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level:
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sfc.wide.ad.jp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9hhcqsaOnAC0 for <qirg@ietfa.amsl.com>; Sun, 17 Nov 2019 22:00:38 -0800 (PST)
Received: from mail1.sfc.wide.ad.jp (mail1.sfc.wide.ad.jp [203.178.142.133]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CECD2120106 for <qirg@irtf.org>; Sun, 17 Nov 2019 22:00:37 -0800 (PST)
Received: from [IPv6:2001:df2:c900:2411:84fc:58cc:91bd:ed48] (unknown [IPv6:2001:df2:c900:2411:84fc:58cc:91bd:ed48]) (Authenticated sender: rdv) by mail1.sfc.wide.ad.jp (Postfix) with ESMTPSA id CE1D76591; Mon, 18 Nov 2019 15:00:35 +0900 (JST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sfc.wide.ad.jp; s=mail1; t=1574056835; bh=fqPBUVvNxXxRWmhudJO7PchkWDk3VF/kykqVP6LI1oI=; h=From:Subject:Date:In-Reply-To:Cc:To:References:From; b=uQx2Wh1eMbJCBROigdF02kGkGL4t69+4Y+IwSkDCA4P8FCMaLHJftn0+y0YGRmrH1 coub3G4HpeiCji6ia7xnPqlK94qtxbI1GXJsJO1630ljyHEatVi+yc0SsGsI9X7b1J KC1oMfjPS1bQhuKCWnHekOPNudp0CkxQPhaOqNSRsIrq7dtjgcrp2GzxoroKFl1CRo 3dBj1cJfT+KVY6tH+ahtrpPsdaHava+5Bp/N28n/eE1sFqOc/f+NvA3lFpFW41TKdc qTZdDDk6reB9KXSC4BF3KSw9frKcBUgN4kajwomWdxt01E2opR1NLKNiMVDunDDj1J Ye29t+qaC98pg==
From: Rodney Van Meter <rdv@sfc.wide.ad.jp>
Message-Id: <9E1CC1FD-A06E-4996-A2A7-EEE618BBFB78@sfc.wide.ad.jp>
Content-Type: multipart/alternative; boundary="Apple-Mail=_BC6E1CE1-D443-409B-BA80-6017A6AC67F2"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Date: Mon, 18 Nov 2019 15:00:35 +0900
In-Reply-To: <331F2FAA-6B26-40E7-BE68-379943AECF8F@gmail.com>
Cc: Rodney Van Meter <rdv@sfc.wide.ad.jp>, qirg@irtf.org
To: Bruno Rijsman <brunorijsman@gmail.com>
References: <331F2FAA-6B26-40E7-BE68-379943AECF8F@gmail.com>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/qirg/8jg2LehZid91xnQu-GMO7JeliVE>
Subject: Re: [Qirg] QKD in OpenSSL
X-BeenThere: qirg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Quantum Internet \(proposed\) RG" <qirg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/qirg>, <mailto:qirg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/qirg/>
List-Post: <mailto:qirg@irtf.org>
List-Help: <mailto:qirg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/qirg>, <mailto:qirg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Nov 2019 06:00:40 -0000

Very cool.

You might check out some of the work we did five years ago that never made it to RFC.
https://tools.ietf.org/html/draft-nagayama-ipsecme-ipsec-with-qkd-01 <https://tools.ietf.org/html/draft-nagayama-ipsecme-ipsec-with-qkd-01>

One interesting, and controversial, topic is what to do when an eavesdropper *does* interfere with a QKD connection.  It’s a great, and easy, DOS attack.  So, should the rekeying stop, and the connection depending on the rekeying be killed when the key lifetime expires?  Or should there be a fallback mechanism of potentially lower security?

This is more of an issue for IPsec, which has rekeying and explicit lifetimes, than for SSL.

Rodney Van Meter
Professor, Faculty of Environment and Information Studies
Keio University, Japan
rdv@sfc.wide.ad.jp



> On Nov 13, 2019, at 21:47, Bruno Rijsman <brunorijsman@gmail.com> wrote:
> 
> For those interested, I just posted a report on how we added support for Quantum Key Distribution (QKD) to OpenSSL during the RIPE Pan-European Hackathon at QuTech last week. 
> 
> http://bit.ly/openssl-qkd <http://bit.ly/openssl-qkd>
> 
> — Bruno
> _______________________________________________
> Qirg mailing list
> Qirg@irtf.org
> https://www.irtf.org/mailman/listinfo/qirg