Apple launching quantum-resistant iMessage encryption algorithm

Nycturne

Elite Member
Posts
1,139
Reaction score
1,488
I think I'm going to have to read up on what PQC Level 2, 3 and 4 actually mean in this context, and what Apple changed. It's interesting, but I can't really expect 9to5 to give me the details I crave.
 

Cmaier

Site Master
Staff Member
Site Donor
Posts
5,329
Reaction score
8,520
I think I'm going to have to read up on what PQC Level 2, 3 and 4 actually mean in this context, and what Apple changed. It's interesting, but I can't really expect 9to5 to give me the details I crave.
I think apple invented those levels?

Worthwhile proposing a framework to talk about this stuff, though.
 

Nycturne

Elite Member
Posts
1,139
Reaction score
1,488
Yeah, I just need to read Apple's stuff on this really, once I get a bit more time tonight.
 

Cmaier

Site Master
Staff Member
Site Donor
Posts
5,329
Reaction score
8,520
Yeah, I just need to read Apple's stuff on this really, once I get a bit more time tonight.
To that end, here’s Apple’s website in case anyone is looking for it.

 

Cmaier

Site Master
Staff Member
Site Donor
Posts
5,329
Reaction score
8,520
Looks like it uses very large symmetric keys, and continual ratcheted re-keying where future keys don’t depend on prior state.
 

Nycturne

Elite Member
Posts
1,139
Reaction score
1,488
Looks like it uses very large symmetric keys, and continual ratcheted re-keying where future keys don’t depend on prior state.

According to Ars, it also looks like they are now using Kyber for key encapsulation as well. Interesting we’re starting to see some of these newer algorithms show up.

 

theorist9

Site Champ
Posts
613
Reaction score
563
The premise is that current encryption algorithms could be broken once quantum computers become available, hence bad actors could collect sensitive encrypted data today and decrypt it when that happens: Harvest Now, Decrypt Later (HNDL).

But this shouldn't be unique to PQ. Indeed, it seems it should already be happening since, according to
Security Risks of Outdated Encryption (Chester Avery, GlobalSign Blog, 12/11/2023), "Outdated standards like 512-bit RSA (Rivest–Shamir–Adleman) and 128-bit AES (Advanced Encryption Standard) ...can now be broken in feasible timeframes by well-resourced attackers".

So is the present-tense version of HNDL (which I suppose we could term "Harvest Previously, Decrypt Now") happening? I've not been able to find any articles that touch upon this.
 

Nycturne

Elite Member
Posts
1,139
Reaction score
1,488
The premise is that current encryption algorithms could be broken once quantum computers become available, hence bad actors could collect sensitive encrypted data today and decrypt it when that happens: Harvest Now, Decrypt Later (HNDL).

It should also be stated that the key algorithms that are most vulnerable are asymmetric algorithms, the armpit in your plate armor, as it were. It's these algorithms that allow you to exchange the more secure symmetric keys used for actual data encryption, or sign a hash that represents a digital signature. What makes them uniquely vulnerable is because the private and public keys are correlated, and yet, the public key must be resistant against attack. For example, RSA's public key is two prime numbers multiplied together, while the private key are the two prime numbers. The only thing keeping an attacker at bay is the compute power required to run a general number field sieve on a number that is on the order of 10^600 when using a 2kbit key.

RSA is vulnerable to Shor's, as is Elliptic Curve (TIL). The new hotness for key exchange and digital signatures is apparently the CRYSTALS project, which includes Kyber (key exchange) and Dilitihium (signatures). NIST officially started looking at standardizing both of these not that long ago: https://www.nist.gov/news-events/ne...lgorithms-can-resist-attack-quantum-computers

So what Apple's doing here is bringing in Kyber along with the Elliptic Curve key exchange. It sounds like both keys are required to complete the key exchange, and produce the shared symmetric key. Which is good. Kyber is relatively new and if a vulnerability is found that somehow makes it worse than Elliptic Curve, then at the very least, an adversary still needs to break Elliptic Curve as well. So they are hedging their bets in the off chance that CRYSTALS doesn't deliver on its promises. It's this sort of detail I was hoping to get from Apple's blog post, and they delivered.

So is the present-tense version of HNDL (which I suppose we could term "Harvest Previously, Decrypt Now") happening? I've not been able to find any articles that touch upon this.

If it is, I don't think it's been discovered by researchers. A lot of what you mention above (such as 512-bit RSA and 128-bit AES) was deprecated quite a while ago. NIST updated their guidance of using 1kbit RSA at a minimum back in 2002, as of 2015, the recommendation is 2kbit RSA minimum.

Out of curiosity, I looked at an HTTPS certificate I got from Let's Encrypt recently. It's using SHA-256 for the signature hash, and Elliptic Curve for the asymmetric key pair with a strength equivalent to roughly a 7kbit RSA key pair, which is reasonable for today's needs. Because TLS certificates need to be kept up to date, you aren't going to find a bunch of stuff on older keys for very long unless someone screwed up badly. Odds are that if folks were harvesting data only protected by 512-bit RSA keys, it's almost twenty years old now. Have to be playing quite a long game.

256-bit AES is still considered resistant to quantum attacks. But I would expect to see AES and SHA go to larger sizes in the future to keep ahead of advancements in quantum computers. So Apple's not changing out the underlying encryption on the message itself (it's still AES256 as far as I can tell), but rather how these keys are cycled using the ratchet, and the addition of a key exchange mechanism that's assumed to be resistant to quantum attacks.

The padded payload is encrypted with AES-CTR using a 256-bit encryption key and initialization vector, both derived from the message key. While public key algorithms require fundamental changes to achieve quantum security, symmetric cryptography algorithms like the AES block cipher only require doubling the key size to maintain their level of security against quantum computers.
 
Top Bottom
1 2