an additional line of defense (on top of PQC within
the IKE protocol) against quantum attackers in a flex-
ible way by combining symmetric keys from arbitrary
key sources like pairwise PSKs, QKD, or MKR.
In future work, we plan more formal analyses of
the correctness and security of our proposed proto-
cols and their implementation. Furthermore, we study
comfortable ways to automatically distribute pairwise
PSKs, e.g., laptops of personnel acting as key carriers
on business trips between VPN sites, and the impli-
cations for MKR. Last, to further reduce the overall
complexity and attack surface of VPNs, we study the
possibility to tunnel the classical channel of QKD de-
vices via the co-located VPN gateway.
ACKNOWLEDGMENTS
This work is funded by dtec.bw – Digitalization
and Technology Research Center of the Bundeswehr
[project MuQuaNet]. dtec.bw is funded by the Euro-
pean Union - NextGenerationEU.
REFERENCES
Bennett, C. H., Bernstein, E., Brassard, G., and Vazirani, U.
(1997). Strengths and Weaknesses of Quantum Com-
puting. SIAM J. Comput., 26(5):1510–1523.
Bennett, C. H. and Brassard, G. (2014). Quantum cryptog-
raphy: Public key distribution and coin tossing. The-
oretical Computer Science, 560:7–11.
Beullens, W. (2022). Breaking Rainbow Takes a Weekend
on a Laptop. In Advances in Cryptology – CRYPTO
2022, volume 13508, pages 464–479.
Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S., and Hanzo,
L. (2022). The evolution of quantum key distribution
networks: On the road to the qinternet. IEEE Commu-
nications Surveys & Tutorials, 24:839–894.
Castryck, W. and Decru, T. (2022). An efficient key recov-
ery attack on SIDH (preliminary version). Cryptology
ePrint Archive, Paper 2022/975.
Deng, J. and Han, Y. (2008). Multipath Key Establishment
for Wireless Sensor Networks Using Just-Enough Re-
dundancy Transmission. IEEE Trans. Dependable and
Secure Comput., 5(3):177–190.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Trans. Inform. Theory, 29(2):198–
208.
Ehlen, S., Hagemeier, H., Hemmert, T., Kousidis, S.,
Lochter, M., Reinhardt, S., and Wunderer, T. (2022).
Quantum-safe cryptography – fundamentals, current
developments and recommendations. Technical
report, Federal Office for Information Security
(BSI). https://www.bsi.bund.de/SharedDocs/
Downloads/EN/BSI/Publications/Brochure/
quantum-safe-cryptography.html?nn=916626.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In Proceedings of the 9th ACM CCS, pages 41–47.
ETSI (2022). ETSI GS QKD 015 - Quantum key distri-
bution (QKD); control interface for software defined
networks. Group Specification Version 2.1.1.
Fluhrer, S., Kampanakis, P., McGrew, D., and Smyslov,
V. (2020). Mixing Preshared Keys in the Internet
Key Exchange Protocol Version 2 (IKEv2) for Post-
quantum Security. Technical report. https://www.
rfc-editor.org/rfc/rfc8784.
ITU-T (2019). Overview on networks supporting quantum
key distribution. Recommendation ITU-T Y.3800.
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and Kivinen,
T. (2014). Internet Key Exchange Protocol Version
2 (IKEv2). Technical report. https://www.rfc-editor.
org/rfc/rfc7296.
Kent, Stephen (2005). IP Encapsulating Security Payload
(ESP). Technical report. https://www.rfc-editor.org/
rfc/rfc4303.
Lan, T., Lee, R., and Chiang, M. (2009). Multi-Path Key Es-
tablishment against REM Attacks in Wireless Ad Hoc
Networks. In Proceedings of the IEEE GLOBECOM
2009, pages 1–8.
Marksteiner, S. and Maurhart, O. (2015). A Protocol for
Synchronizing Quantum-Derived Keys in IPsec and
its Implementation. In Proceedings of the 9th ICQNM.
Neuman, B. and Ts’o, T. (1994). Kerberos: An authentica-
tion service for computer networks. IEEE Commun.
Mag., 32(9):33–38.
NIST (2022). PQC Standardization Process: Announc-
ing Four Candidates to be Standardized, Plus Fourth
Round Candidates. https://csrc.nist.gov/News/2022/
pqc-candidates-to-be-standardized-and-round-4.
Proos, J. and Zalka, C. (2003). Shor’s discrete logarithm
quantum algorithm for elliptic curves. Quantum In-
formation and Computation, 3(4):317–344.
Rass, S. and K
¨
onig, S. (2011). Indirect eavesdropping in
quantum networks. In Proceedings of the 5th ICQNM,
pages 83–88.
Rossberg, M. and Schaefer, G. (2011). A survey on auto-
matic configuration of virtual private networks. Com-
puter Networks, 55(8):1684–1699.
Shor, P. W. (1997). Polynomial-Time Algorithms for Prime
Factorization and Discrete Logarithms on a Quantum
Computer. SIAM J. Comput., 26(5):1484–1509.
Smyslov, V. (2022a). Alternative Approach
for Mixing Preshared Keys in IKEv2 for
Post-quantum Security. Technical report.
https://www.rfc-editor.org/rfc/internet-drafts/
draft-smyslov-ipsecme-ikev2-qr-alt-06.html.
Smyslov, V. (2022b). Intermediate Exchange in the Internet
Key Exchange Protocol Version 2 (IKEv2). Technical
report. https://www.rfc-editor.org/rfc/rfc9242.html.
Welte, H. (2023). The netfilter.org ”libnetfilter queue”
project. https://www.netfilter.org/projects/libnetfilter
queue/.
Wootters, W. K. and Zurek, W. H. (1982). A single quantum
cannot be cloned. Nature, 299(5886):802–803.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
494