Using hybrid post-quantum TLS with Amazon KMS - Amazon Key Management Service
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China.

Using hybrid post-quantum TLS with Amazon KMS

Amazon Key Management Service (Amazon KMS) supports a hybrid post-quantum key exchange option for the Transport Layer Security (TLS) network encryption protocol. You can use this TLS option when you connect to Amazon KMS API endpoints. We're offering this feature before post-quantum algorithms are standardized so you can begin testing the effect of these key exchange protocols on Amazon KMS calls. These optional hybrid post-quantum key exchange features are at least as secure as the TLS encryption we use today and are likely to provide additional security benefits. However, they affect latency and throughput compared to the classic key exchange protocols in use today.

The data that you send to Amazon Key Management Service (Amazon KMS) is protected in transit by the encryption provided by a Transport Layer Security (TLS) connection. The classic cipher suites that Amazon KMS supports for TLS sessions make brute force attacks on the key exchange mechanisms infeasible with current technology. However, if large-scale quantum computing becomes practical in the future, the classic cipher suites used in TLS key exchange mechanisms will be susceptible to these attacks. If you’re developing applications that rely on the long-term confidentiality of data passed over a TLS connection, you should consider a plan to migrate to post-quantum cryptography before large-scale quantum computers become available for use. Amazon is working to prepare for this future, and we want you to be well-prepared, too.

To protect data encrypted today against potential future attacks, Amazon is participating with the cryptographic community in the development of quantum-resistant or post-quantum algorithms. We've implemented hybrid post-quantum key exchange cipher suites in Amazon KMS endpoints. These hybrid cipher suites, which combine classic and post-quantum elements, ensure that your TLS connection is at least as strong as it would be with classic cipher suites.

These hybrid cipher suites are available for use on your production workloads in most Amazon Web Services Regions. However, because the performance characteristics and bandwidth requirements of hybrid cipher suites are different from those of classic key exchange mechanisms, we recommend that you test them on your Amazon KMS API calls under different conditions.

Feedback

As always, we welcome your feedback and participation in our open-source repositories. We’d especially like to hear how your infrastructure interacts with this new variant of TLS traffic.

  • To provide feedback on this topic, use the Feedback link in the lower right corner of this page. You can also create an issue or a pull request in the aws-kms-developer-docs repository in GitHub.

  • We're developing these hybrid cipher suites in open source in the s2n repository on GitHub. To provide feedback on the usability of the cipher suites, or share novel test conditions or results, create an issue in the s2n repository.

  • We're writing code samples for using hybrid post-quantum TLS with Amazon KMS in the aws-kms-pq-tls-example GitHub repository. To ask questions or share ideas about configuring your HTTP client or Amazon KMS client to use the hybrid cipher suites, create an issue in the aws-kms-pq-tls-example repository.

Supported Amazon Web Services Regions

Post-quantum TLS for Amazon KMS is available in all Amazon Web Services Regions except for Amazon GovCloud (US-East), Amazon GovCloud (US-West), China (Beijing), and China (Ningxia).

For a list of Amazon KMS endpoints for each Amazon Web Services Region, see Amazon Key Management Service Endpoints and Quotas in the Amazon Web Services General Reference. For information about FIPS endpoints, see Amazon Service Endpoints in the Amazon Web Services General Reference..

About hybrid post-quantum key exchange in TLS

Amazon KMS supports hybrid post-quantum key exchange cipher suites. You can use the Amazon SDK for Java 2.x and Amazon Common Runtime (CRT) to configure an HTTP client to use these cipher suites on Linux systems. Then, whenever you connect to a Amazon KMS endpoint with your HTTP client, the hybrid cipher suites are used.

This HTTP client uses s2n, which is an open source implementation of the TLS protocol. s2n includes the pq-crypto module, which includes implementations of hybrid post-quantum algorithms for encryption in transit.

The hybrid cipher suites in s2n are implemented only for key exchange, not for direct data encryption. During key exchange, the client and server calculate the key they will use to encrypt and decrypt the data on the wire.

The algorithms that s2n uses are a hybrid that combines Elliptic Curve Diffie-Hellman (ECDH), a classic key exchange algorithm used today in TLS, with Kyber, a proposed post-quantum algorithm. This mechanism uses each of the algorithms independently to generate a key. Then it combines the two keys cryptographically. With s2n, you can configure an HTTP client with a cipher preference that places ECDH with Kyber first in the preference list. Classic key exchange algorithms are included in the preference list to ensure compatibility, but they are lower in the preference order.

If ongoing research reveals that the Kyber algorithm lacks the anticipated post-quantum strength, the hybrid key is still at least as strong as the single ECDH key currently in use. The National Institute for Standards and Technology (NIST) has not yet standardized post-quantum algorithms. They are still in the process of evaluating candidate approaches. Until that process is complete, we recommend using hybrid algorithms, rather than using post-quantum algorithms alone.

Using hybrid post-quantum TLS with Amazon KMS

You can use hybrid post-quantum TLS for your calls to Amazon KMS. When setting up your HTTP client test environment, be aware of the following information:

Encryption in Transit

The hybrid cipher suites in s2n are used only for encryption in transit. They protect your data while it is traveling from your client to the Amazon KMS endpoint. Amazon KMS does not use these cipher suites to encrypt data under Amazon KMS keys.

Instead, when Amazon KMS encrypts your data under KMS keys, it uses symmetric cryptography with 256-bit keys and the Advanced Encryption Standard in Galois Counter Mode (AES-GCM) algorithm, which is already quantum resistant. Theoretical future, large-scale quantum computing attacks on ciphertexts created under 256-bit AES-GCM keys reduce the effective security of the key to 128 bits. This security level is sufficient to make brute force attacks on Amazon KMS ciphertexts infeasible.

Supported Systems

Use of the hybrid cipher suites in s2n is currently supported only on Linux systems. In addition, these cipher suites are supported only in SDKs that support the Amazon Common Runtime, such as the Amazon SDK for Java 2.x. For an example, see How to configure hybrid post-quantum TLS.

Amazon KMS Endpoints

When using the hybrid cipher suites, use the standard Amazon KMS endpoint. The hybrid cipher suites in s2n are not compatible with the FIPS 140-2 validated endpoints for Amazon KMS. Post-quantum algorithms are not allowed in a validated cryptographic module.

When you configure a HTTP client with the hybrid post-quantum cipher preference in s2n, the post-quantum ciphers are first in the cipher preference list. However, the preference list includes the classic, non-hybrid ciphers lower in the preference order for compatibility. If you were to use this cipher preference with an Amazon KMS FIPS 140-2 validated endpoint, s2n negotiates a classic, non-hybrid key exchange cipher.

For a list of Amazon KMS endpoints for each Amazon Web Services Region, see Amazon Key Management Service Endpoints and Quotas in the Amazon Web Services General Reference. For information about FIPS endpoints, see Amazon Service Endpoints in the Amazon Web Services General Reference.

Expected Performance

Our early benchmark testing shows that the hybrid cipher suites in s2n are slower than classic TLS cipher suites. The effect varies based on the network profile, CPU speed, the number of cores, and your call rate. For performance test results, see Round 2 post-quantum TLS is now supported in Amazon KMS.

How to configure hybrid post-quantum TLS

In this procedure, add a Maven dependency for the preview release of the Amazon Common Runtime HTTP Client. Next, configure an HTTP client that uses the hybrid post-quantum cipher preference. Then, create an Amazon KMS client that uses the HTTP client.

To see a complete working examples of configuring and using hybrid post-quantum TLS with Amazon KMS, see the aws-kms-pq-tls-example repository.

  1. Add the Amazon Common Runtime client to your Maven dependencies. We recommend using the latest available version.

    For example, this statement adds version 2.14.13-PREVIEW of the Amazon common runtime client to your Maven dependencies.

    <dependency> <groupId>software.amazon.awssdk</groupId> <artifactId>aws-crt-client</artifactId> <version>2.14.13-PREVIEW</version> </dependency>
  2. To enable the hybrid post-quantum cipher suites, add the Amazon SDK for Java 2.x to your project and initialize it. Then enable the hybrid cipher suites as shown in the following example.

    This code ensures that you are working on a system that supports the hybrid cipher suite. The code then creates an HTTP client with the TLS_CIPHER_PREF_KMS_PQ_TLSv1_0_2020_07 cipher preference that prioritizes the ECDH with Kyber hybrid cipher suite. Finally, it creates an Amazon KMS client that uses the HTTP client for data transmission.

    This code uses the Amazon KMS asynchronous client, KmsAsyncClient, which calls Amazon KMS asynchronously. For information about this client, see the KmsAsyncClient Javadoc.

    After this code completes, your Amazon KMS API requests on the Amazon KMS asynchronous client use the hybrid cipher suite for TLS.

    // Check platform support if(!TLS_CIPHER_PREF_KMS_PQ_TLSv1_0_2020_07.isSupported()){ throw new RuntimeException("Hybrid post-quantum cipher suites are not supported on this platform"); } // Configure HTTP client SdkAsyncHttpClient awsCrtHttpClient = AwsCrtAsyncHttpClient.builder() .tlsCipherPreference(TLS_CIPHER_PREF_KMS_PQ_TLSv1_0_2020_07) .build(); // Create the Amazon KMS async client KmsAsyncClient kmsAsync = KmsAsyncClient.builder() .httpClient(awsCrtHttpClient) .build();
  3. Test your Amazon KMS calls with post-quantum TLS.

    When you call Amazon KMS API operations on the configured Amazon KMS client, your calls are transmitted to the Amazon KMS endpoint using hybrid post-quantum TLS. To test your configuration, run a simple Amazon KMS API call, such as ListKeys.

    ListKeysReponse keys = kmsAsync.listKeys().get();

Testing hybrid post-quantum TLS with Amazon KMS

Consider running the following tests with hybrid cipher suites on your applications that call Amazon KMS.

  • Run load tests and benchmarks. The hybrid cipher suites perform differently than traditional key exchange algorithms. You might need to adjust your connection timeouts to allow for the longer handshake times. If you’re running inside an Amazon Lambda function, extend the execution timeout setting.

  • Try connecting from different locations. Depending on the network path your request takes, you might discover that intermediate hosts, proxies, or firewalls with deep packet inspection (DPI) block the request. This might result from using the new cipher suites in the ClientHello part of the TLS handshake, or from the larger key exchange messages. If you have trouble resolving these issues, work with your security team or IT administrators to update the relevant configuration and unblock the new TLS cipher suites.

Learn more about post-quantum TLS in Amazon KMS

For more information about using hybrid post-quantum TLS in Amazon KMS, see the following resources.