{"id":484023,"date":"2018-05-22T16:43:06","date_gmt":"2018-05-22T23:43:06","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&#038;p=484023"},"modified":"2025-10-01T11:57:13","modified_gmt":"2025-10-01T18:57:13","slug":"post-quantum-crypto-vpn","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/post-quantum-crypto-vpn\/","title":{"rendered":"Post-quantum Cryptography VPN"},"content":{"rendered":"<h2>Post-quantum Crypto and VPNs<\/h2>\n<p>Every time you make a secure connection over the internet &#8211; to your bank, to Facebook, or nearly anywhere online &#8211; cryptography is what keeps that communication secure. Some of that cryptography\u00a0is based upon\u00a0mathematical problems known to be solvable by a quantum computer. As\u00a0the\u00a0scientists working on quantum computers continue to make progress, cryptographers are at work as well, developing new post-quantum cryptosystems based upon\u00a0mathematical problems which\u00a0we believe are\u00a0resistant to\u00a0quantum attacks.<\/p>\n<p>When it comes time, migrating all network traffic,\u00a0including communications from services and applications,\u00a0to new post-quantum\u00a0cryptography will be a time-consuming and\u00a0lengthy process. Fortunately, we have some time. Even the most optimistic estimates are that it will be five or more years before a sufficiently powerful and stable quantum computer capable of breaking today&#8217;s public-key cryptography\u00a0is running.<\/p>\n<p>As we and other research teams around the world work\u00a0to develop new cryptosystems, we\u00a0are\u00a0testing how candidates\u00a0work with real-world protocols and applications. One of the most important scenarios for post-quantum crypto\u00a0is VPNs.<\/p>\n<p>VPNs establish a secure link between two points on the internet and allow applications to run inside them as if they were on the same network.\u00a0In the future, when\u00a0post-quantum cryptosystems have been vetted by efforts like the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\">NIST Post-Quantum Project<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, VPNs that are protected by post-quantum cryptography can be rapidly deployed to protect existing applications, until the applications themselves can be updated to use the new algorithms natively.<\/p>\n<h2>Post-quantum Crypto VPN Software<\/h2>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/microsoft\/PQCrypto-VPN\">You can go directly to our project page at GitHub here.<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>This project takes a fork of the OpenVPN software and combines it with post-quantum cryptography. In this way, we can\u00a0test these algorithms with VPNs, evaluating functionality and performance of the quantum resistant\u00a0cryptography. Because this project is experimental, it should not be used to protect sensitive data or communications at this time. Further cryptanalysis and research must first\u00a0be done over the next\u00a0few years to\u00a0determine which algorithms are truly post-quantum safe.<\/p>\n<p>In the current release, traffic is only protected from attack by a quantum computer when the traffic passes through the VPN tunnel between the client and the server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-485586 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/05\/diagram.jpg\" alt=\"\" width=\"602\" height=\"332\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/05\/diagram.jpg 602w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/05\/diagram-300x165.jpg 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/p>\n<h6>Figure 1: Traffic between the Client and Server 1 has post-quantum protection, because Server 1 is on the same trusted network as the VPN Server. Traffic between the Client and Server 2 does not have post-quantum crypto protection.<\/h6>\n<p>After traffic exits the VPN server,\u00a0communication staying within a organization\u2019s own internal network or a trusted cloud provider is protected. When working with this software, construct your test application architecture to ensure this is the case.\u00a0Should traffic go out onto the public internet, as in the above diagram to Server 2, it will only be protected by classical cryptography and would again be vulnerable to attack by a quantum computer.<\/p>\n<p>For more information on how to download and use this software, as well as the source code and build instructions, please see\u00a0<u><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/Microsoft\/PQCrypto-VPN\">our project page at GitHub<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/u>. Binary releases can be found on the\u00a0<u><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/Microsoft\/PQCrypto-VPN\/releases\/\">GitHub releases page<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/u>.<\/p>\n<p>More information on post-quantum cryptography can be found on\u00a0<u><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/post-quantum-cryptography\/\">the overall post-quantum cryptography project page<\/a><\/u>.<\/p>\n<h2>Talk to us<\/h2>\n<p>Please file bug reports, feature requests, and other issues with the code on the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/Microsoft\/PQCrypto-VPN\/issues\">GitHub issues tracker<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. For contributions via pull requests, please see the section on Contributing on the GitHub project page.<\/p>\n<p>Please send other feedback, questions, and comments to us at <a href=\"mailto:msrsc@microsoft.com\">msrsc@microsoft.com<\/a> &#8211; we&#8217;d like to hear from you!<\/p>\n<p>&nbsp;<\/p>\n<h2>Research Team<\/h2>\n<ul class=\"msr-people-list stripped ms-row no-margin-bottom\">\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Karen-Easterbrook_360x360.jpg\" alt=\"Portrait of Karen Easterbrook\" \/>\n<p class=\"body-alt no-margin-bottom\"><a class=\"semibold\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/keaster\/\">Karen Easterbrook<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Principal Lead Program Manager<\/p>\n<\/li>\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Kevin-Kane_360x360.jpg\" alt=\"Portrait of Kevin Kane\" \/>\n<p class=\"body-alt no-margin-bottom\"><a class=\"semibold\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/kkane\/\">Kevin Kane<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Principal Software Development Engineer<\/p>\n<\/li>\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Brian-LaMacchia_360x360.jpg\" alt=\"Portrait of Brian LaMacchia\" \/>\n<p class=\"body-alt no-margin-bottom\"><a class=\"semibold\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bal\/\">Brian LaMacchia<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Distinguished Engineer<\/p>\n<\/li>\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Dan-Shumow_360x360.jpg\" alt=\"Portrait of Dan Shumow\" \/>\n<p class=\"body-alt no-margin-bottom\"><a class=\"semibold\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/danshu\/\">Dan Shumow<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Senior Software Development Engineer<\/p>\n<\/li>\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Greg-Zaverucha_360x360.jpg\" alt=\"Portrait of Greg Zaverucha\" \/>\n<p class=\"body-alt no-margin-bottom\"><a class=\"semibold\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/gregz\/\">Greg Zaverucha<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Senior Software Development Engineer<\/p>\n<\/li>\n<li class=\"xs-col-12-24 s-col-4-24 m-col-4-24 l-col-4-24 margin-bottom-sp3\"><img decoding=\"async\" class=\"avatar avatar-180 photo msr-profile-image \" \n \t src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2018\/04\/Christian-Paquin_360x360.jpg\" \/>\n<p class=\"body-alt no-margin-bottom\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cpaquin\/\">Christian Paquin<\/a><\/p>\n<p class=\"body-alt no-margin-bottom\">Principal Program Manager<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Post-quantum Crypto and VPNs Every time you make a secure connection over the internet &#8211; to your bank, to Facebook, or nearly anywhere online &#8211; cryptography is what keeps that communication secure. Some of that cryptography\u00a0is based upon\u00a0mathematical problems known to be solvable by a quantum computer. As\u00a0the\u00a0scientists working on quantum computers continue to make [&hellip;]<\/p>\n","protected":false},"featured_media":485547,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[243138,13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-484023","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Karen Easterbrook","user_id":32510,"people_section":"Section name 1","alias":"keaster"},{"type":"user_nicename","display_name":"Kevin Kane","user_id":32554,"people_section":"Section name 1","alias":"kkane"},{"type":"user_nicename","display_name":"Christian Paquin","user_id":31473,"people_section":"Section name 1","alias":"cpaquin"},{"type":"user_nicename","display_name":"Dan Shumow","user_id":31538,"people_section":"Section name 1","alias":"danshu"},{"type":"user_nicename","display_name":"Greg Zaverucha","user_id":31912,"people_section":"Section name 1","alias":"gregz"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/484023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":34,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/484023\/revisions"}],"predecessor-version":[{"id":1151010,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/484023\/revisions\/1151010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/485547"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=484023"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=484023"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=484023"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=484023"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=484023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}