CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

Follow us on Twitter: @cloudinsidr
  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home cybersecurity and cyber warfare TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy
TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

Cloud Insidr 2018-06-03 Leave a Comment

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

TLS 1.3 and post-quantum cryptography are subjects of much debate. Upgrade or wait—this is the big question facing administrators and users alike.

There are quite a few reasons to jump onto the TLS 1.3 bandwagon immediately, with or without quantum cryptography. Here is why.  

Perfect forward secrecy

First and foremost, the current state of TLS security is far from satisfactory. Without forward secrecy—not to mention perfect forward secrecy that only comes with TLS 1.3—, an adversary can capture web traffic at will and archive it for later “perusal”. One compromised key is all it takes to decrypt everything.

For a chilling introduction to TLS vulnerabilities that threaten your data and infrastructure, see the post: “Attack vectors against TLS, implementation bugs, and how to mitigate TLS vulnerabilities“.

The Titan supercomputer at the Oak Ridge National Laboratory
The Titan supercomputer at the Oak Ridge National Laboratory: No. 5 on TOP500 supercomputers list

It has been known for some time that state-sponsored adversaries attempt to decrypt prerecorded communications on a regular basis. Why else would they be pushing so hard for worldwide dominance in supercomputing?

Pushing they are indeed. The #1 and #2 on the TOP500 supercomputers list are owned by the Chinese government. No. 1 is run by the National Supercomputing Center in Wuxi. No. 2 crunches numbers in the National Super Computer Center in Guangzhou. Both are located in China, behind its Great Firewall.

UPDATE: The No. 1 trophy returned to America.

Sunway TaihuLight, TLS 1.3 and post-quantum cryptography
Sunway TaihuLight occupies the coveted No. 1 spot on the TOP500 supercomputers list with its 10,649,600 cores, 93,014 TFlop/s (Rmax) and 125,435 (Rpeak). It’s located in the NRCPC National Supercomputing Center in Wuxi, China.

The other global superpowers can no longer pretend it’s business as usual.

Given the recent aggressive stance of China in the South China Sea, there is no reason to expect anything less hostile in the domain of cyber security. Any data traffic which relies on the decade-old TLS 1.2 standard (not to mention even earlier versions of the protocol which are still quite prevalent) will sooner rather than later fall prey to decryption attempts by state-sponsored adversaries—and that might hurt a lot. TLS 1.3 at least buys you some time (see the spec here).

TLS 1.3 and post-quantum cryptography

Second, for a handful of superpowers, quantum computing can facilitate the decryption of previously protected web traffic. Pre-quantum ciphers are no match for quantum computers.

TLS 1.3 offers some hope when deployed with quantum-resistant cipher suites. Microsoft’s supersingular isogeny-based cryptography and the corresponding SIDH v3.0 crypto library come to mind.

But we are not there yet. Perfect forward secrecy is the first prerequisite and TLS 1.3 delivers.

Protect the GDPR downside

Third and last but not least, the GDPR is currently rearing its ugly head on a worldwide scale. The first lawsuits are on their way to court hearings. For example, an Austrian privacy activist Maximillian Schrems filed four lawsuits on Day One. He is seeking fines from Facebook with 3.9 billion Euro and Google with 3.7 billion Euro. That’s 8.9 billion US Dollars and change.

While it might take more than a year for the European Court to come up with its final verdict, the case could set another precedent. After all, with his prior lawsuit, Mr. Schrems singlehandedly took down the US-EU Safe Harbor regulation.

The general consensus among legal scholars dictates that it applies to any company, which handles the data of EU citizens, even to a U.S. company that has no physical presence in the EU.

The GDPR gives draconian fines a whole new meaning. Authorities may punish a business for a data breach, resulting in penalties of either 4% of its worldwide turnover in the prior year or a lump sum of 20 million Euros, whichever is higher. Don’t believe it? Feel free to read the full text of the regulation; it’s on the books right here.

The GDPR might be a not-so-veiled attempt of the European Union to make up for its own budget shortfalls. Be as it may, it’s the law of the land (and then some). 

All in all, there are three good reasons to act: China’s supercomputing supremacy, the quantum computing revolution and the GDPR. 

In conclusion

In context of the above developments, tightening the cyber security screws has more merit than ever. A switch to TLS 1.3 with TLS 1.2 as a fallback seems to be worthy of an immediate pursuit. 

For advice on TLS implementation, please read: “TLS 1.3 (with AEAD) and TLS 1.2 cipher suites demystified: how to pick your ciphers wisely“. To protect the end users on your network, please refer to “TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks“.

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, encryption Tagged With: GDPR, perfect forward secrecy, post-quantum cryptography, TLS 1.3

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

Recent Posts

  • Upgrading from CentOS 6 to CentOS 7 and Beyond?
  • How To Figure Out Who is Signing In To Dovecot to Send or Retrieve Email
  • OpenSSH 9.9 Introduces Enhanced Quantum-Resistant Algorithms
  • OpenSSL 3.3 Final Release is now live!
  • How to Activate HTTP/2 with TLS 1.3 Encryption in NGINX for Secure Connections without a Performance Penalty
  • Is AWS sucking your budget dry? Strip it down to the nitty-gritty (without breaking stuff)
  • How to attach and mount an NVMe EBS volume on EC2
  • SELinux security contexts: correcting SELinux labels on a file system
  • Intel gobbling up Israeli Tower Semiconductor, Stock Goes Through The Roof
  • NGINX on AWS EC2: setting up a web server from scratch on a domain of your choice
  • Log4j RCE and mitigation techniques
  • Set up logrotate for Postfix

Symantec

Categories

  • administration and orchestration
  • alerts
  • AWS
  • Bitcoin
  • cloud, edge and everything in between
  • cryptocurrencies
  • cybersecurity and cyber warfare
  • databases
  • DNS
  • encryption
  • events
  • FinTech and InsurTech
  • homeland security
  • HTTP Security Headers
  • industries
  • industry analysis
  • industry gossip
  • Java
  • Linux
  • mail servers
  • networking
  • news
  • NGINX
  • people
  • php-fpm
  • reviews
  • SELinux
  • tips and tricks
  • Uncategorized
  • web servers in the cloud

Tags

AMI AWS AWS EBS Azure certificate cipher suites cryptography cyber defense cybersecurity cyber security Diffie-Hellman DNS DNS over HTTPS Dovecot EBS EC2 email encryption Fedora HTTP/2 HTTPS IBM letsencrypt Linux logs MariaDB MFA MySQL NGINX OpenSSL permissions php-fpm PHP 7 postfix RegEx Route 53 RSA SELinux SQL SSH SSL TLS TLS 1.3 TLS vulnerabilities WordPress

Archives

  • January 2025
  • November 2024
  • October 2024
  • May 2024
  • January 2023
  • March 2022
  • February 2022
  • December 2021
  • December 2020
  • November 2020
  • September 2020
  • January 2020
  • November 2019
  • August 2019
  • July 2019
  • April 2019
  • December 2018
  • October 2018
  • September 2018
  • August 2018
  • June 2018
  • May 2018
  • April 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • August 2017
  • April 2017
  • February 2017
  • January 2017
  • November 2016
  • September 2016
  • August 2016
  • July 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • July 2015
  • February 2015

Recent Comments

    Wicked fast Networking (With a Government Clearance to Boot)

    ©2022 CybrAnalytiqa OÜ

    • Content purchasing and syndication