Podcast
Root Causes 449: What Is a Quantum-safe HSM?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
December 18, 2024
Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module (HSM).
Podcast Transcript
Lightly edited for flow and brevity.
Today, for example, when you think of the big concern about store now, decrypt later, but when you think of the connection between two HSM, if someone is able to store that and decrypt it later because those two HSMs use classic cryptography, you're already in trouble with your HSM.
When you think of an HSM as a box providing you, as the application user, cryptographic operation, a set of questions that's never really brought up is, what does an HSM use internal to its architecture, which is cryptographically based in nature, and that, to me, is a question that not many people have raised or highlighted, and it's a critical component of being quantum-safe HSM. You can't be a classic HSM and change yourself into a quantum-safe one unless your internal operation have been rearchitected, redesigned to now operate with all the post-quantum cryptography algorithm that we have today.
This is a fresh new design because that cryptography has only been around for a few years now.
We designed an HSM that has been from the very moment we started thinking had to be quantum-safe. As we approach our design, we selected cryptographic operation that were quantum-safe, and any tricks that we would use would be quantum-safe in nature, and so on and so forth. One day, we take this design and now we want to apply to be FIPS validated, because everyone knows that HSMs have to be vetted. They have to eventually make this mythical process, take this mythical journey to eventually be FIPS labeled, and I recently used for someone else an equivalence, which is think of it as in a medical drug design process. If you design a drug, you have to go through, say, an FDA approval. The drug may be fantastic, but unless it's gone through critical clinical trials and then FDA approved, you're still not being sold. HSMs don't get sold unless they've been FIPS validated. So FIPS is to the HSM world what FDA is to the drug manufacturing world.
With that said, we started down the path of our FIPS validation, and we were explaining to our labs that we were going to use quantum-safe signatures for the firmware update process.
So, in essence, a machine like an HSM does not go out in the field and does not stay stable. I mean, you never just launch a product like that without considering the fact that you will likely do firmware updates, bring new features, and especially nowadays, with crypto agility being the talk of the town, you better be able to keep updating your machines to bring about the new features that the users of the HSM will want to use. Today, we're kind of using a few PQC algorithm, but in a few years from now when NIST is done with the next batch, well chances are you might want to start exploring new cryptographic functionality of your HSMs. So firmware update is a very important part.
You need two things to do a firmware update. First, you need the ability to sign the code, and somewhere in the future, that code needs to be validated by the HSM. So the HSM that lives out there has to have a root of trust that allows it to validate your signature. But to apply a PQC signature, we had to kind of debate, I wouldn't call it fight, but we had to debate quite heavily with the lab to explain the fact that, in our opinion, it was very poor practice to only use ECDSA or only use RSA for firmware update for a brand new design, because we all know everyone has got to shift away from ECDSA and RSA. So we needed to have a PQC signature.
We finally managed to have the lab accept that an ECDSA signature, in addition to an LMS, which is one of the hash-based signatures, could be allowed and only be allowed because NIST had on their FAQ page the ability to suggest you could do hybrid signature as long as one of those two algorithm is FIPS approved and in this case, ECDSA was the approved algorithm. So we were allowed to throw in LMS not because it would make our HSM quantum-safe. We absolutely wanted it to be quantum-safe, but as far as they were concerned, it counts as a zero from a FIPS design point of view.
Where I'm going with this is, in today's world, when you're designing an HSM, if the bar that you're trying to reach is FIPS, FIPS does not give you quantum-safe HSM by design. FIPS says, as long as you've got a FIPS approved algorithm, you're fine. So redesigning the signature process, the manufacturing process of your HSMs to ensure the injection of roots of trust and the use of those root of trust when you do firmware update is not something that all HSM vendors have gone and have done. I'm not even sure how many have even attempted that. This is one of the very first step in becoming a quantum-safe HSM in our opinion. You can't be quantum-safe unless your internal design is now designed to resist attacks on quantum computer in all shapes and manner. So firmware update is definitely a pretty important one.
The only thing that might exist to help you is if we were to produce, say, an RFI, for example, request for information. You send this out to your vendors. You say, all right, I'd like you to tell me, describe to me, how do you do your firmware updates? Are they based on root of trust at our PQC? Is the signature PQC ready? When you have two HSMs connected and they need to exchange keys, is that exchange based on post-quantum cryptographic algorithm that will be secure if I do store now, decrypt later? If you store any cryptographic material in a backup file or in a file outside of the HSM and on the PC or on the server, how do you secure that? What’s the key management techniques? Is a different element from RSA? If you do, for example, attestation. So some machines, especially, more and more today, when I deploy an HSM out there in the cloud, and I don't know what's in between the cloud HSM and my server, local, if I want to generate the key and then do an attestation that that key exists in the HSM that's portraying itself as being in the cloud, I need an attestation that will be safe and secure. If you do an attestation using classic signature on a post-quantum cryptographic material, it tends to be a weird thing.
If you have all had to deal with the transition to having HSMs being used for cryptographic signature keys for all code signing going forward, I think since last June if I recall. Now in order to achieve the validation of a key that's being portrayed as coming from an HSM, attestation is one of those tricks that the HSM can provide you. Well, if you're going to attest in a few years from now, an MLDSA key, and all the HSM can do is sign with RSA or ECDSA, it's kind of a bit of a broken piece there.
So there's a whole pile of constructs and techniques and capabilities that HSMs have to use in their day to day lives in order for those machines to act and behave and give you the kind of capabilities you're looking for as a PKI vendor, for example. So these machines, even before you're connected to those machines, you don't have to do a signature with the machine, but in between those machines, how they get firmware update, how they do attestation, how they store keys outside, where are the roots of trust? Are they planted inside? All of these questions are not going to be on any spec sheets anytime soon.
So the theme here is that to be a quantum-safe HSM, you have to start with a fresh design. You can't take something that exists and hope to patch it. You can't take a classic HSM and stick QR and V-chip in it and expect that to all of a sudden, the magic has happened, and it's quantum-safe. Sometimes I see some marketing literature where they somehow make you believe as you're reading the documentation that because there's quantum random number generators somewhere in that machine, the keys are now secure against quantum attack. Well, RSA what are fed by QRNG or TRNG, is going to be broken, no matter what via quantum computers. So forget about the QRNG saving your bacon here. It’s not gonna do anything.
The parallel I'm seeing is Tim and I have talked a lot about how we've gone from the age where you could have unmanaged certificates if the scale of certificates that you're managing is low, but that day is over now with the shortening of certificate lifespans and all the other risks that you face with certificates. You're showing us that complacency with old school HSMs is going to be a big mistake. So what I would like you to describe for me then is how does that affect the upcoming the needs for post-quantum or quantum-safe HSMs at scale.
So, in other words, the panic button will get hit in the next three, four years. Is the industry ready to do this mass change of legacy, classic HSMs that served us so well for decades to something completely new? Are we ready? Just in terms of the supply chain.
Your hardware devices, especially the HSMs, you can't just wait at the last minute to order all your HSM needs, because I can tell you, if anyone recalls something called COVID, and when everybody went to order masks. Guess what happened? Those physical things that you order in massive quantity get to be very expensive, and you may not necessarily get the deliveries that you paid for.
HSM is that beast at the bottom of the stack that no one really wants to talk about and would prefer it goes away, but it's a foundational block of our established digital trust and economy and so on, and you need to make sure that those machines are carefully migrated very quickly, swiftly in an orderly fashion, so that we don't end up with all being bunched up at the end with a massive panic and it's too late and there's not enough supply to satisfy the demand. I do think it's doable, but if the world shifts to the right and keeps waiting, eventually there's going to be a very high price to pay for having not moved fast enough. That's definitely if anyone wants to take that message home, I would suggest the HSMs you have today are very likely classic HSM because - -
Today's HSM, the HSMs of the classic era were designed with a different mindset. They were designed almost anti agility. It was almost like a vendor lock in kind of concept, and I think we need to very quickly go away from there. As we're trying to make the world a better place and a safer place, there's a whole lot of things that need to be revisited, and I think vendors have to be stepping up to the plate, and they have to all come up with if the supply chain is going to be able to satisfy the demand here everyone has got to start working hard at getting their classic HSM completely redesigned to become quantum-safe and open and swappable, so that the world that will exist in the future will be one where crypto agility is just a part of the day to day operations. It won't be a new concept. It should be ingrained in everything we do going forward.
I'm gonna get off my soapbox here. But you guys see this on a daily basis. When you think, just in your space, the variance of x.509 certificate that could end up existing, the variance of certificate path validation chain that have multiple different algorithms at different levels, from the root to the intermediate CAs to the leaf certificate, you will also have to be super agile from a PKI design point of view, and the machine that exists below the PKI better be able to keep up with your demand, because you're going to get demanded or asked by the community that you supply certificates to to have this agility built in. So it's a very it's a full stack approach.
Agility is definitely the responsibility of the entire stack. Every component, every element, have to be consisting of agility designed by principle, everything needs to be able to adapt and there will be a lot of adaptation in the future. I don't think 30 years of RSA is going to cut it in the future. It won't likely be 30 years of MLDSA. It could, but I don't think it will. Anyways, I'll stop here. Enough pontification for today.

