Standards
Crux VPN can be deployed as FIPS 140-3 Inside 4743.
With the Arqit SKA-Platform™ (SKA-P) used as the cryptographic broker, Crux VPN can be deployed in any environment where NIST standards or FIPS 140-3 validation must be upheld.
In its design of a novel secure key agreement platform, Arqit has used only approved NIST cryptographic modules and has developed protocols which strongly conform to NIST guidance and requirements.
Standardized and approved primitives and algorithms
Cryptographic primitives and algorithms standardised by NIST and, in some cases, included in CNSA Suite 2.0 have been implemented either directly or via SKA-P within Crux VPN.
Primitive name | Use | Approved | CNSA 2.0 | Relevant NIST documents |
---|---|---|---|---|
AES256-GCM | Block cipher | ✔ | ✔ | SP800-175B, SP800-38D, SP800-38F, FIPS 197 |
SHA-256 | Hash function | ✔ | ✘ | SP800-175B, FIPS 180 |
ML-KEM* | Key encapsulation mechanism | ✔ | ✔ | FIPS 203 |
*Note that PQAs are optional for the delivery of initial root-of-trust key material. Crux VPN can operate using entirely symmetric cryptography if desired.
Because SKA-P is agnostic to the choice of cipher and hashing algorithm so that they could be replaced at any time with other standards, such as SHA-3 specified in FIPS 202, or the alternative AES modes specified in SP800-38F.
Conformance to SP 800-71 guidelines
NIST does not approve protocols, though they do make recommendations on how protocols may be implemented. SP800-71 outlines NIST’s recommendations for key establishment using symmetric block ciphers, one of the fundamental functions of the platform.
SKA-P closely follows the recommendations outlined in SP 800-71. In particular:
§3.4 – Key distribution using symmetric-key techniques. Both manual and automated distribution of keys is supported in accordance with the given guidance.
§4.1 – Center-based key establishment architectures. SKAP can be considered a key centre as described, but with the advantage that it never has total knowledge of the final shared symmetric key used for encryption.
§5.1 – General communication requirements:
-
(a) An authenticated AES-GCM is used, which provides confidentiality, integrity and authentication for messages used in key establishment.
-
(b) The key-ratcheting mechanism can create new authentication keys for each key agreement process, where required.
-
(d) The key establishment protocol includes checks on authentication and protections against replay attacks using nonces.
-
(f) All keys are labelled by the entity that generates them.
Arqit’s key establishment protocols have been reviewed and assured by a third party.
“The security proofs for the design aspects of the key-establishment protocols used to enable symmetric key agreement over classical IP network infrastructures within Arqit’s platform were independently assured in 2022.” – Statement from the Surrey Centre for Cyber Security, at the University of Surrey in the United Kingdom.
No restrictions on encryption method
SKAP places no restriction on the encryption method with the keys that are provided by the platform and therefore can fully comply with the approved guidance in SP800-175B.
Interfaces with standard protocols
Beyond key agreement, SKAP can also use its keying methods in existing communication standards such as IPsec and TLS. The use of a post-quantum pre-shared key (PPK) in IPsec as defined in RFC 8784 is covered by NIST in SP 800-77, with specific mention of PPKs in §3.7. Similarly, use of a pre-shared key (PSK) in TLS 1.3 is discussed in SP 800-52 Rev. 2 with a PSK specifically mentioned in §3.4.2.9–10. Again, NIST do not strictly approve these (or any other) protocols, but Arqit can demonstrate conformance with their recommendations for best practice implementation.
We expect that other protocols, such as MACsec and DNSSEC, can also make use of key material from SKAP.
Conformance to Commercial Solutions for Classified (CSfC) requirements on symmetric key management
In May 2022, the Commercial Solutions for Classified (CSfC) group, part of the NSA, published an update to their Symmetric Key Management Requirements Annex (SKM Annex) which dictates how Government agencies can incorporate quantum-safe symmetric key protections into solutions which use off-the-shelf commercial products to protect classified networks. This version improved and clarified pre-shared key (PSK) usage and added requirements for the implementation of RFC-8784 for IKE v2. A joint implementation of SKAP with dedicated VPN hardware has been demonstrated to secure IPsec tunnels, using an architecture defined in the Enterprise Gray Implementation Requirements Annex published by CSfC. The results show that when implemented correctly SKAP meets the operational and security demands of Government agencies and strongly conforms to NSA requirements.
Alignment with ISO/IEC 11770-2:2018
The International Standards Organisation (ISO) maintain standards for symmetric key management in ISO/IEC 11770-2:2018. The SKAP key agreement mechanism follows the guidelines set out in this standard in its implementation of key establishment using symmetric cryptographic techniques.
FIPS 140-3 Inside
As SKAP is “FIPS 140-3 Inside #4743”, so is Crux VPN meaning it safely employs a FIPS-validated cryptographic module to provide cryptographic services. The platform can be operated in FIPS 140-3 mode in compliance with BouncyCastle #4743 security policy.
NIST promotes near-term use of symmetric key agreement
For completeness, we note that NIST have written that “the protection of symmetric keys using symmetric key-wrapping schemes and replacing asymmetric digital signature schemes with symmetric-key message authentication schemes is one approach to replacing public key cryptographic key management in the relatively near term” (SP800-71, lines 468–478). We fully support this view.
About Arqit
Arqit’s SKA-Platform™ is a classical key agreement architecture that is fully conformant with NIST best practice and approved cryptographic algorithms. We believe Arqit’s solution is an ideal solution for environments where NIST standards must be upheld and competitively selected it as the cryptographic broker in Crux.