Giter Site home page Giter Site logo

microsoft / quantum-safe-openssh Goto Github PK

View Code? Open in Web Editor NEW
11.0 5.0 5.0 29.07 MB

Quantum Safe OpenSSH

License: MIT License

CMake 1.08% C 89.19% Batchfile 0.01% Shell 1.82% Python 0.25% Objective-C 0.01% C++ 0.70% Assembly 0.97% PHP 3.01% Makefile 0.29% KRL 0.03% M4 0.87% Roff 1.47% HTML 0.24% Awk 0.05%

quantum-safe-openssh's Introduction

Quantum-Safe OpenSSH for Linux VM on Azure



Overview

This project makes available, through the Azure marketplace, Linux virtual machines pre-configured with post-quantum enabled OpenSSH.

VM administrators may logon and manage their VMs over a quantum-safe SSH connection when connecting with the quantum-safe OpenSSH client. Using Visual Studio Code you can remotely connect to the source-code project on this VM to explore, build, and debug the quantum-safe OpenSSH applications and packages.

This project combines the below components into these Azure virtual-machine images:


Open Quantum Safe - liboqs
 liboqs is cryptography library supporting post-quantum key-encapsulation and signature algorithms.
https://github.com/open-quantum-safe/liboqs

Open Quantum Safe - OpenSSH
 A fork of openssh-portable 7.9 that incorporates the liboqs library to support PQ algorithms in OpenSSH.
https://github.com/open-quantum-safe/openssh

Debian-OpenSSH
 The Debian 7.9 release of openssh-portable. This contains distro-specific application package source, patches, and configuration to support installation onto a Debian/Ubuntu distro.
https://salsa.debian.org/ssh-team/openssh/-/tree/debian/1%257.9p1-10+deb10u1

PQ Enabled OpenSSH Source
 The unified source code of the above projects: OQS-liboqs + OQS-OpenSSH + Debian-OpenSSH
 You may explore, build, and debug this PQ implementation of OpenSSH.
https://github.com/microsoft/Quantum-Safe-OpenSSH

Azure VM Images
 Azure supported Debian and Ubuntu distro images with the liboqs enabled OpenSSH server preinstalled and configured for these specific Linux distros.
https://azuremarketplace.microsoft.com/Quantum-Safe-OpenSSH


Supported Algorithms

Details on each supported algorithm can be found in the liboqs docs/algorithms folder.

These supported algorithms are a subset of the round 2 candidates of the NIST standardization competition, as provided by the Open Quantum Safe library. This list will change following upcoming OQS updates.

Key encapsulation mechanisms (KEM)

  • BIKE
  • Classic McEliece
  • FrodoKEM
  • HQC
  • Kyber
  • NewHope
  • NTRU
  • SABER
  • SIKE
  • ThreeBears

Signature schemes

  • Dilithium
  • Falcon
  • MQDSS
  • Picnic
  • qTesla
  • Rainbow
  • SPHINCS+

Limitations and Security

This version of OpenSSH is intended for research, prototyping, and experimentation purposes only. It is not recommended for use in production or business environments and/or to protect sensitive data.


Per the 'Limitations and Security' section of the Open-Quantum-Safe liboqs project:

While at the time of this writing there are no vulnerabilities known in any of the quantum-safe algorithms used in this library, caution is advised when deploying quantum-safe algorithms as most of the algorithms and software have not been subject to the same degree of scrutiny as for currently deployed algorithms. Particular attention should be paid to guidance provided by the standards community, especially from the NIST Post-Quantum Cryptography Standardization project. As research advances, the supported algorithms may see rapid changes in their security, and may even prove insecure against both classical and quantum computers.

liboqs does not intend to "pick winners": algorithm support is informed by the NIST PQC standardization project. We strongly recommend that applications and protocols rely on the outcomes of ths effort when deploying post-quantum cryptography.

We realize some parties may want to deploy quantum-safe cryptography prior to the conclusion of the NIST PQC standardization project. We strongly recommend such attempts make use of so-called hybrid cryptography, in which quantum-safe public-key algorithms are used alongside traditional public key algorithms (like RSA or elliptic curves) so that the solution is at least no less secure than existing traditional cryptography.

WE DO NOT CURRENTLY RECOMMEND RELYING ON THIS LIBRARY IN A PRODUCTION ENVIRONMENT OR TO PROTECT ANY SENSITIVE DATA. This library is meant to help with research and prototyping. While we make a best-effort approach to avoid security bugs, this library has not received the level of auditing and analysis that would be necessary to rely on it for high security use

[Top]

quantum-safe-openssh's People

Contributors

ljoy913 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

quantum-safe-openssh's Issues

ACTION REQUIRED: Microsoft needs this private repository to complete compliance info

There are open compliance tasks that need to be reviewed for your Quantum-Safe-OpenSSH repo.

Action required: 4 compliance tasks

To bring this repository to the standard required for 2021, we require administrators of this and all Microsoft GitHub repositories to complete a small set of tasks within the next 60 days. This is critical work to ensure the compliance and security of your microsoft GitHub organization.

Please take a few minutes to complete the tasks at: https://repos.opensource.microsoft.com/orgs/microsoft/repos/Quantum-Safe-OpenSSH/compliance

  • The GitHub AE (GitHub inside Microsoft) migration survey has not been completed for this private repository
  • No Service Tree mapping has been set for this repo. If this team does not use Service Tree, they can also opt-out of providing Service Tree data in the Compliance tab.
  • No repository maintainers are set. The Open Source Maintainers are the decision-makers and actionable owners of the repository, irrespective of administrator permission grants on GitHub.
  • Classification of the repository as production/non-production is missing in the Compliance tab.

You can close this work item once you have completed the compliance tasks, or it will automatically close within a day of taking action.

If you no longer need this repository, it might be quickest to delete the repo, too.

GitHub inside Microsoft program information

More information about GitHub inside Microsoft and the new GitHub AE product can be found at https://aka.ms/gim or by contacting [email protected]

FYI: current admins at Microsoft include @bal-msft, @ljoy913, @patricklonga, @kevinmkane, @christianpaquin, @keasterbrook, @cryptosidh, @zaverucha

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.