Get Started with PQC
Read this topic to learn about PQC features in Junos OS and Junos OS Evolved.
Quantum-Resistant Security Features
Juniper Networks provides advanced cryptographic capabilities to safeguard networks against emerging quantum threats. Junos® OS and Junos® OS Evolved use the following approaches to ensure protection:
-
Implement quantum-safe technologies such as the ETSI Quantum Key Distribution (QKD) to interface with key delivery servers for secure key exchange in VPNs.
-
Adapt cryptoagility with Quantum Buffer to meet the evolving cryptographic standards and enable flexible key management through fungible key delivery servers.
-
Adopt the National Institute of Standards and Technology (NIST)-approved post-quantum cryptography (PQC) algorithms for encryption, authentication, and key exchange.
Juniper Networks PQC implementation provides seamless integration with backward compatibility and no service disruption.
Use Feature Explorer to confirm platform and release support for specific features.
Learn about the following key features and implementations.
- Quantum-Safe Support
- PQC Libraries and Algorithms
- Quantum Buffer
- Quantum-Resistant Key Exchange in SSH
- PQC-Signed Software Images
Quantum-Safe Support
Table 1 shows a list of features supported with quantum-safe implementations in Junos OS and Junos OS Evolved.
|
Feature Name |
Details |
|---|---|
|
Quantum-Safe IPsec VPN |
Supports RFC 8784 in IPsec VPNs.
|
|
Quantum-Safe MACsec |
|
PQC Libraries and Algorithms
Table 2 shows NIST-standardized quantum-resistant PQC algorithms.
|
Algorithm |
Type |
Description |
|---|---|---|
|
ML-KEM |
Key Encapsulation |
Module-lattice-based key encapsulation mechanism built on CRYSTALS-Kyber algorithm. |
|
ML-DSA |
Digital Signature |
Module-lattice-based digital signature based on CRYSTALS-Dilithium algorithm. |
|
SLH-DSA |
Digital Signature |
Stateless hash-based digital signature based on SPHINCS+ algorithm. |
Juniper Networks includes PQC libraries to ensure readiness for PQC algorithms.
Table 3 shows the list of supported cryptographic libraries for PQC.
|
Library |
Purpose |
|---|---|
|
OpenSSL 3.5 |
Provides support for PQC algorithms for secure communications. |
|
Leancrypto |
Serves as the kernel cryptographic library for PQC readiness. |
Quantum Buffer
Juniper Networks strengthens finite field cryptography (FFC) parameters in existing public key cryptography. This approach reduces the risk from Cryptographically Relevant Quantum Computers (CRQCs) and supports a smooth transition to PQC. This Quantum Buffer approach extends the time window and resists cryptanalytic attacks by reinforcing FFC parameters.
Juniper Networks implements Quantum Buffer for the SSH protocol. See The Quantum Buffer.
Quantum-Resistant Key Exchange in SSH
Juniper Networks supports Shor-resistant key exchange to strengthen SSH security against quantum attacks. Network devices can use the hybrid Streamlined NTRU Prime 761 plus X25519 key exchange algorithm. This algorithm combines lattice-based and elliptic curve techniques to provide strong protection against quantum threats. See key-exchange.
PQC-Signed Software Images
Juniper Networks provides PQC-signed Junos OS and Junos OS Evolved images. These images use digital signatures for integrity verification that comply with the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) recommendations. You can validate the image signature off-box using your preferred verifier on a local machine. See PQC Signatures for Software Images.
Assess Your Quantum-Resistant Security Requirements
Organizations face evolving security challenges as quantum computing advances. To protect your network and maintain compliance, understand your security requirements and implement appropriate quantum-resistant security features. Use the following assessment to determine which quantum-resistant security features are essential for your network:
-
Asses infrastructure—Assess your network infrastructure including your Juniper Networks hardware and software. Use PQC-signed software images as first line of defense to ensure image integrity and compliance with CNSA 2.0 recommendations. See PQC-Signed Software Images.
-
Explore PQC readiness and quantum-safe options—Understand Juniper Networks readiness with PQC algorithms. Review the available technologies for quantum-safe VPNs, including quantum-safe IPsec and quantum-safe MACsec. See PQC Libraries and Algorithms, Quantum-Resistant Key Exchange in SSH, and Quantum-Safe Support.
-
Evaluate risk tolerance—Know your network's risk tolerance for quantum computing threats. Implement cryptoagility with Quantum Buffer solution and fungible key management systems to strengthen existing cryptography during migration. See Quantum Buffer and Quantum-Safe Support.
-
Secure critical deployments—Determine your critical deployments such as IPsec and MACsec implementations. Secure these deployments with quantum-safe technologies. See Quantum-Safe Support.
Plan your upgrade for a quantum-resistant network.
Next Steps
Read the following topics to know more about the quantum-resistant security features: