Podcast
Root Causes 387: What Is the Post-quantum Readiness of HSMs?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 16, 2024
We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).
Podcast Transcript
Lightly edited for flow and brevity.
The question I get is, with respect to post-quantum cryptography, people who are enlightened to the fact that they know they've got to do something, they know they've got to do something and they might even know that part of what they've got to do is inventory of their cryptographic assets, which is I know something you've spoken about on our podcast before. I think that people really want to have a deep dive understanding of what's the status of HSMs right now because they know that's really the root of things, whether it's public trust, meaning, right, Sectigo is an example of a publicly trusted CA. We back our roots with HSMs and therefore, it's gonna be important with new post quantum roots to have new kinds of HSMs. And then also, of course, there's the big problem of we're going to need new private CAs that are post-quantum capable. And everybody knows that a really good private CA has an HSM behind it. And so, because I'm usually talking to people who usually are very turned on to this subject, they always want to start the subject of where is the HSM industry right now, with respect to being ready for post-quantum. And there it is for you, Bruno. And can you please add at the top of that response your background, maybe some people, I'm just gonna say some people, might not know just how deep you go in that in being able to make these statements. So introduce your, you know, your background within the world of HSM, which is just an incredible thing.
I'll start with where does that knowledge come from. I'll give you a few seconds here on this. Back in 1994, so 30 years ago, I co-founded a company called Crypto4A. Sorry, Chrysalis-ITS here in Ottawa, Canada and at Chrysalis-ITS, we started making HSMs. The first form factor was a PCMCIA card. PCMCIA if you recall, looked like a credit card, but much thicker. So we did those PCMCIA cards and created the first HSMs I guess in that form factor, built those to accompany users in their travels so that they could do cryptography. Instead of a smartcard, they’d have a much bigger and faster cryptographic engine. Then the name we gave to that PCMCIA card was the Luna HSM. And if you guys have ever been involved with PKI, there's a chance you've dealt with some descendants of the Luna PCMCIA card. So we did PCI cards and in 2001, we created a variant of the PCI card that we embedded in a server, built a shot, a chassis around it, and it became the Luna HSM, which was network attached.
So the Luna HSM family comes from this 1994 kind of starting point and along the way, I got quite involved with designing something to inject and extract keys using an Maven sharding process, or a Shamir secret sharing scheme, in essence. Again, if you've played with the Luna HSM, you probably might have used a Luna PED, which was the small handheld device that would allow you to read your keys and then people referred to those as baby keys, and so on, because they were colorful and plastic like. But in essence, we created HSMs, we built HSMs, we sold those things back in the 90s.
And then I left to go and be a consultant with our own Canadian government, in places like CSC, which is equivalent to NSA in the U.S., Tim, and DND, which is our DOD equivalent. Again, working on advanced security, key management, PKI, embedded radio systems, and so on. Ultimately, Crypto4A came out of a view that I shared with old colleagues, from the days of Chrysalis. We felt that commercial HSMs were not really getting ready fast enough for the quantum era, which we believe strongly back in 2012 timelines was going to become a very critical, foundational challenge for any HSM vendors.
If you're going to be providing an HSM to secure the roots of trust, for the digital economy of a quantum era economy, well, you better have quantum safe HSM as your roots. Otherwise, it's kind of a broken piece of your stack that's broken. So we started the Crypto4A in that premise and we were always surprised, to be honest, to not see many HSM vendors attending and paying attention to that dynamic and quantum dynamic, I would call it, until recently. And I think it all changed dramatically when in 2022, U.S. government became quite serious about the transition to a post-quantum era, the NCCOE project for quantum or post-quantum transition. All of that kind of became a force that somehow got a lot of the HSM vendors to be involved and become interested in that transition. And I'd say that right now, from where we stand, many HSM vendors are actually active and trying to get their HSMs to become quantum safe in time to have the ability to run the PQC algorithms on their HSMs.
If you've purchased an HSM, an existing HSM that needs to provide you a certain level of performance, I mean transactions per seconds, and that those transactions per second that you need out of your box are likely RSA or ECDSA signatures, you’re not going to find any firmware updates for these HSMs that will likely get you to the same ML-KEM or ML-DSA, which used to be called Dilithium signings per seconds because these HSMs exist that have been sold for tens of years have evolved to be highly specialized in terms of hardware to be very fast at certain types of cryptographic algorithms. They are nominally fast.
But these fast processing capability can only handle classic cryptography. So when you need to switch that machine from a classic crypto to a PQC cryptography, you're gonna find yourself falling apart in terms of performance.
The second aspect that you also need to ask yourself, is you've got today a classic HSM. That classic HSM has been designed and manufactured and deployed with a root of trust that allows this HSM to verify the firmware updates using a classic signature, probably RSA in many cases. Now, if you've got that classic HSM and you want to use the classic HSM to up your game and be able to offer PQC strength root of trust, there's a bit of a break in the chain of trust in the sense that the firmware you get even if it implements ML-KEM or ML-DSA, that firmware itself will be signed using RSA. I mean, there's no choices there because the classic HSM you own would not be able to verify the firmware using a ML-DSA signature. So you have to have a bit of a leap of faith where the firmware update process and ongoing firmware update process will constantly be updating your machine using classic strength to deliver to you PQC strength. Then you have to ask yourself, is that something that you feel okay with? Is that breaking the chain of trust or that potential weakness in that chain of trust something you can just move on and live with?
If you do a firmware update on an HSM, and the final line of defense is when the HSM verifies the signature, the signature verification process, if it uses RSA or ECDSA, you better hope that that machine is out of your labs or out of your operation before quantum computers exist to break these RSA signatures. Because where I'm going with this is, if I'm able to break your signature keys, then I can take your firmware, modify it, sign it again, because I do now have your signing keys and send it to your HSM and your HSM would not know that this firmware update actually contains rogue elements and potentially very - -
And all I need to do is I need to access your public key and if I can reverse engineer the public key using quantum computers, I'm able to use the fact that I now know your signature keys and start signing all sorts of firmware out there.
But the challenge, Tim, is where are the other HSM vendors at. Because ultimately, Tim, you would want to make sure that it's not just Crypto4A that you have in your availability search. And as I said earlier, we are collaborating. NIST’s, the NCCOE mentioned earlier had a PQC project, very well organized project and we collaborate with many other HSM vendors. They're all at the moment working on implementing their own cryptography solutions. They're all working hard to becoming - making strides towards being fully quantum ready. At this stage, I would say all of them are probably still deploying firmware libraries in their classic HSMs. I don't think any of them have done a full, you know, from top to bottom sort of redesigned HSM that's built on quantum root of trust. I don't believe that exists yet. Other than ours. But everyone is working very hard at getting there as soon as possible. How much time is it going to take them is a different question. I can’t answer that one.
But we would still have been able to buy bread, drive our cars, get gas and connect with people using fax machines and blah, blah, blah. Y2Q is a different beast altogether. A very large portion of what we use on a daily basis is - -

