Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Get Started with PQC

Read this topic to learn about PQC features in Junos OS and Junos OS Evolved.

Quantum-Resistant Security Features

Juniper Networks provides advanced cryptographic capabilities to safeguard networks against emerging quantum threats. Junos® OS and Junos® OS Evolved use the following approaches to ensure protection:

  • Implement quantum-safe technologies such as the ETSI Quantum Key Distribution (QKD) to interface with key delivery servers for secure key exchange in VPNs.

  • Adapt cryptoagility with Quantum Buffer to meet the evolving cryptographic standards and enable flexible key management through fungible key delivery servers.

  • Adopt the National Institute of Standards and Technology (NIST)-approved post-quantum cryptography (PQC) algorithms for encryption, authentication, and key exchange.

Juniper Networks PQC implementation provides seamless integration with backward compatibility and no service disruption.

Use Feature Explorer to confirm platform and release support for specific features.

Learn about the following key features and implementations.

Quantum-Safe Support

Table 1 shows a list of features supported with quantum-safe implementations in Junos OS and Junos OS Evolved.

Table 1: Quantum-Safe Support

Feature Name

Details

Quantum-Safe IPsec VPN

Supports RFC 8784 in IPsec VPNs.

  • Uses out-of-band key exchange mechanisms, such as QKD, to strengthen IPsec tunnel security.

  • Implements preshared key mixing, also known as post-quantum preshared keys (PPKs), in Internet Key Exchange Version 2 (IKEv2) for post-quantum security.

See Quantum Safe IPsec VPN.

Quantum-Safe MACsec

  • Implements frequent key refresh through QKD using key delivery servers.

  • Uses AES-256 encryption, which is inherently quantum-safe.

PQC Libraries and Algorithms

Table 2 shows NIST-standardized quantum-resistant PQC algorithms.

Table 2: NIST-Standardized PQC algorithms

Algorithm

Type

Description

ML-KEM

Key Encapsulation

Module-lattice-based key encapsulation mechanism built on CRYSTALS-Kyber algorithm.

ML-DSA

Digital Signature

Module-lattice-based digital signature based on CRYSTALS-Dilithium algorithm.

SLH-DSA

Digital Signature

Stateless hash-based digital signature based on SPHINCS+ algorithm.

Juniper Networks includes PQC libraries to ensure readiness for PQC algorithms.

Table 3 shows the list of supported cryptographic libraries for PQC.

Table 3: Supported PQC Libraries

Library

Purpose

OpenSSL 3.5

Provides support for PQC algorithms for secure communications.

Leancrypto

Serves as the kernel cryptographic library for PQC readiness.

Quantum Buffer

Juniper Networks strengthens finite field cryptography (FFC) parameters in existing public key cryptography. This approach reduces the risk from Cryptographically Relevant Quantum Computers (CRQCs) and supports a smooth transition to PQC. This Quantum Buffer approach extends the time window and resists cryptanalytic attacks by reinforcing FFC parameters.

Juniper Networks implements Quantum Buffer for the SSH protocol. See The Quantum Buffer.

Quantum-Resistant Key Exchange in SSH

Juniper Networks supports Shor-resistant key exchange to strengthen SSH security against quantum attacks. Network devices can use the hybrid Streamlined NTRU Prime 761 plus X25519 key exchange algorithm. This algorithm combines lattice-based and elliptic curve techniques to provide strong protection against quantum threats. See key-exchange.

PQC-Signed Software Images

Juniper Networks provides PQC-signed Junos OS and Junos OS Evolved images. These images use digital signatures for integrity verification that comply with the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) recommendations. You can validate the image signature off-box using your preferred verifier on a local machine. See PQC Signatures for Software Images.

Assess Your Quantum-Resistant Security Requirements

Organizations face evolving security challenges as quantum computing advances. To protect your network and maintain compliance, understand your security requirements and implement appropriate quantum-resistant security features. Use the following assessment to determine which quantum-resistant security features are essential for your network:

  • Asses infrastructure—Assess your network infrastructure including your Juniper Networks hardware and software. Use PQC-signed software images as first line of defense to ensure image integrity and compliance with CNSA 2.0 recommendations. See PQC-Signed Software Images.

  • Explore PQC readiness and quantum-safe options—Understand Juniper Networks readiness with PQC algorithms. Review the available technologies for quantum-safe VPNs, including quantum-safe IPsec and quantum-safe MACsec. See PQC Libraries and Algorithms, Quantum-Resistant Key Exchange in SSH, and Quantum-Safe Support.

  • Evaluate risk tolerance—Know your network's risk tolerance for quantum computing threats. Implement cryptoagility with Quantum Buffer solution and fungible key management systems to strengthen existing cryptography during migration. See Quantum Buffer and Quantum-Safe Support.

  • Secure critical deployments—Determine your critical deployments such as IPsec and MACsec implementations. Secure these deployments with quantum-safe technologies. See Quantum-Safe Support.

Plan your upgrade for a quantum-resistant network.

Next Steps

Read the following topics to know more about the quantum-resistant security features: