Internet Measurement of Quantum-Resistant IKEv2 in Constrained Networks

πŸ“… 2024-11-24
πŸ›οΈ arXiv.org
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Existing IKEv2 implementations face critical deployment bottlenecks under quantum computing threats, primarily due to incompatibility with large public keys and signatures of standardized post-quantum cryptography (PQC). Method: This work introduces the first software-hardware co-designed, scalable quantum-safe IPsec measurement platform, integrating CRYSTALS-Kyber (KEM) and Dilithium (signature), a customized IKEv2 protocol stack, and multi-scenario network impairment injection capabilities. Evaluation is conducted across cloud-based virtual networks, SDR-based hardware loops, and the national-scale FABRIC testbed. Contribution/Results: Empirical results reveal that all IETF-standardized PQC-enabled IKEv2 variants fail to establish connections in >90% of cases under packet loss rates exceeding 5% or bandwidth below 1 Mbpsβ€”exposing a fundamental robustness gap in resource-constrained environments. These findings shift the design paradigm for quantum-safe protocols from theoretical standard compliance toward deployment resilience, providing critical empirical evidence and concrete optimization directions for lightweight quantum-safe key exchange mechanisms.

Technology Category

Application Category

πŸ“ Abstract
Within 1-2 decades, quantum computers are expected to obsolesce current public-key cryptography, driving authorities such as IETF and NIST to push for adopting quantum-resistant cryptography (QRC) in ecosystems like Internet Protocol Security (IPsec). However, IPsec struggles to adopt QRC, primarily due to the limited ability of Internet Key Exchange Protocol Version 2 (IKEv2), which establishes IPsec connections, to tolerate the large public keys and digital signatures of QRC. Many solutions (e.g., IETF RFCs) are proposed to integrate QRC into IKEv2, but remain largely untested in practice. In this paper, we measure the performance of these proposals over the Internet by designing and implementing a novel, scalable, and flexible testbed for quantum-resistant IPsec, and we expose the serious shortcomings of existing proposals for quantum-resistant IKEv2 when deployed in constrained (e.g., lossy, rate-limited) networks. Through experimental deployments ranging from cloud-based virtual networks to hardware-in-the-loop wireless links between software-defined radios, as well as deployment on the international FABRIC testbed for next-generation networks, we show that today's solutions for quantum-resistant IPsec are insufficient, necessitating development of better approaches.
Problem

Research questions and friction points this paper is trying to address.

Evaluating quantum-resistant IKEv2 performance in constrained network environments
Testing RFC proposals for post-quantum IPsec under real-world limitations
Identifying bottlenecks in quantum-safe cryptography adoption for Internet security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Developed testbed for quantum-resistant IKEv2 evaluation
Measured performance over constrained and Internet-scale networks
Revealed bottlenecks with high latency and packet loss
πŸ”Ž Similar Papers
No similar papers found.