Cloudflare has standardized Post-Quantum IPsec using a hybrid ML-KEM approach, addressing the 'harvest now, decrypt later' threat without requiring specialized hardware. This move is critical for wide-area networks (WANs) to meet the NIST 2030 deadline for quantum-resistant encryption, integrating these new standards directly into their SASE platform. The architecture employs a parallel ML-KEM and classical Diffie-Hellman setup to ensure both quantum and classical security.
Read original on InfoQ ArchitectureThe looming threat of quantum computers capable of breaking current public-key cryptography (like RSA and Elliptic Curve Cryptography) has led NIST to set a 2030 deadline for transitioning to quantum-resistant algorithms. This presents a significant challenge for existing network infrastructure, especially in Wide Area Networks (WANs) where secure, high-performance communication is critical. The 'harvest now, decrypt later' attack vector, where adversaries collect encrypted data today to decrypt with future quantum computers, makes this migration urgent.
Cloudflare's approach centers on implementing a hybrid Module-Lattice-based Key-Encapsulation Mechanism (ML-KEM) for IPsec. This method runs ML-KEM in parallel with classical Diffie-Hellman, providing a 'belt-and-suspenders' security model. ML-KEM secures against quantum threats, while Diffie-Hellman continues to protect against classical attacks. This design ensures robust, forward-secret encryption without necessitating costly hardware upgrades or complex configurations.
System Design Implication
When designing secure distributed systems, especially those with long-lived encrypted data or high-value assets, consider the impact of post-quantum cryptography. A hybrid approach like ML-KEM provides a practical transitional strategy, allowing for future-proofing without immediately abandoning well-understood classical algorithms. Prioritize key establishment migration as it protects against 'harvest now, decrypt later' attacks.
The hybrid ML-KEM support is built into Cloudflare's IPsec IKEv2 Responder and has been tested for interoperability. For the Cloudflare One Appliance, the update was simplified by leveraging TLS 1.3 with integrated hybrid ML-KEM. This demonstrates a strategic architectural decision to standardize security protocols across different network layers (TLS, IPsec) to achieve consistent post-quantum protection across their global network, including high-availability routing for resilience.