Secure Message Relay over Networks with QKD-Links Stefan Rass and Mohammed Ali Sfaxi + and Solange Ghernaouti-H´ elie and Kyandoghere Kyamakya Institute for Smart-System Technologies, Klagenfurt University, Austria + ADHOC PES AG 4123 Allschwil Switzerland ISI - University of Lausanne 1015 Switzerland {stefan.rass, kyandoghere.kyamakya}@uni-klu.ac.at, mohamed-ali.sfaxi@adhoc.ag, sgh@unil.ch Abstract—This paper presents extensions to the classical point- to-point protocol PPP [RFC1661] and IPSEC [RFC 2401] in order to build networks that can do unconditionally secure message relay. Our work addresses the problem of how to integrate quantum key distribution (QKD) in networks such that little effort needs to be put on protocol engine adaption and network topology design. This article demonstrates how to ensure correct routing and secure authentication between adjacent QKD-capable nodes, in particular, it is demonstrated how a person-in-the-middle attack can be countered using universal hash functions. I. INTRODUCTION The last two decades have witnessed the rise of a new technology of secure message transmission, which is called quantum cryptography or quantum cryptographic key distribution (QKD). The first such protocol BB84, given in 1984 by Charles Bennett and Gilles Brassard can be proven to be unconditionally secure (see, for instance, [Shor and Preskill, 2000]), however, by definition, this ap- proach can only realize key establishment between directly connected nodes. Due to physical reasons, the distance over which photons can successfully be transmitted is way too much limited to have it applicable between cities or across the ocean. It is technically no problem to define networks which perform packet-forwarding over QKD-secured links, however, the plaintext necessarily shows up at each intermediate node along the message-path. Another problem is related to the authentication, since QKD itself cannot ensure the identity of the other party. This paper aims at addressing the following problems, while proposing solutions which can be implemented by nowadays available technological means. Moreover, we explicitly do not consider nor confine ourselves to any specific form of QKD (several of which exist). We explicitly treat QKD as a primitive, which lets us secure links in an information- theoretically secure manner, and we demonstrate how to create networks inheriting the capability of unconditionally secure message relay from their links. In detail, we shall give ideas on how to solve the following issues that naturally arise when building a practical QKD-based network: 1) How to perform key distribution over multi-hop connec- tions? 2) How to secure the corresponding routing process? 3) How to authenticate adjacent nodes in an uncondition- ally secure manner? The advantage of our approach is twofold: First, it relies on QKD-extended versions of existing protocols. It has been demonstrated how to create advanced point-to-point protocols using QKD and how to extend the capabilities of IPSEC in order to benefit from the new technology. The wide acceptance and implementation of these protocols make them natural candidates for augmentation with QKD, and thus for being building blocks of future unconditionally secure networks. Second, we explicitly aim at using the simplest possible form of QKD to achieve maximum security. We consider QKD itself as a black box without relying on specific features of a certain QKD method. Our protocols thus work with BB84 equally well as with more complicated (and thus more expensive) forms of QKD, which may be still in the experimental stage. This paper is organized as follows: Section II motivates the need for securing transmission within the link layer (layer 2) of the Open Systems Interconnection (OSI) reference model 1 , and sections II-A and II-B summarize the extensions to PPP and IPSec based on QKD. Section III contains our results concerning the construction of suitable networks and the protocols for multi-hop secret distribution. Secure routing algorithms and authentication schemes are sketched in that context. The paper closes with a discussion of related work. II. INTEGRATING QKD IN OSI LAYER 2 PROTOCOLS Securing layer 2 transmission is fundamental because this service is common and necessary to all kinds of nodes’ connections. The security processing is done transparently to the users and to the other protocols. Securing the link layer is more optimized than securing the upper OSI layers since neither additional encapsulation nor header is required in level 2. The Point to Point Protocol [RFC1661] is a link layer pro- tocol, widely used to connect adjacent nodes. The service of data confidentiality during transmission is not offered by the original protocol, but it has been introduced later by supporting the Encryption Control Protocol [RFC1968]. This protocol uses the classical cryptography (algorithms such as 1 ISO International standard IS 7498 and X.200 ITU Recommendation Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10 Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10 Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10 Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10 Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10 Second International Conference on Quantum, Nano and Micro Technologies 0-7695-3085-0/08 $25.00 © 2008 IEEE DOI 10.1109/ICQNM.2008.14 10