Rethinking Cryptography in the Linux Kernel: Preparing for the Post-Quantum (PQC) Era

Speaker: Yunseong Kim

Track: Embedded & Kernel

Type: Long talk (45 minutes)

Preparing the Linux Kernel for Post-Quantum Cryptography (PQC)

This session explores practical steps and considerations for enabling Post-Quantum Cryptography (PQC) support in the Linux kernel, focusing on integration strategies relevant to open-source contributors and kernel developers.

Why It Matters

  1. Current public-key cryptography (e.g., RSA, ECDSA) is susceptible to attacks from quantum computers.
  2. To ensure long-term security of the Linux ecosystem, proactive adoption of quantum-resistant algorithms is crucial.
  3. While userspace projects like OpenSSH, OpenSSL, and WireGuard have started testing hybrid PQC schemes, the Linux kernel also needs a clear roadmap to stay aligned.

Focus of This Talk

  1. Emphasis is on practical groundwork, not theoretical cryptographic research.
  2. The session examines where PQC can be introduced in the kernel and how to structure early experimentation.

Key Considerations

  1. Standards Alignment: Keeping track of NIST’s PQC algorithm standardization and migration guidelines.
  2. Industry Readiness: Insights from PQCC, NCSC, and tech companies working on post-quantum transition strategies.
  3. Open Source Landscape: How existing open-source projects are implementing hybrid PQC (e.g., Kyber + X25519 in OpenSSH) and what we can learn from them.
  4. Migration Risks: Hybrid algorithms, performance bottlenecks, and potential compatibility issues in kernel-level code.

Where PQC Can Be Applied in the Kernel

  1. Integrity and Code Signing
  2. PQC-based verification for:
    • Kernel module signing (e.g., replacing RSA keys in sign-file tool).
    • Firmware validation (UEFI secure boot flow).
  3. In-Kernel Key Exchange & Encryption
  4. IPsec / WireGuard kernel modules using PQC-enabled key exchange (e.g., Kyber).
  5. PQC integration with the Linux kernel’s key management (keyrings) subsystem.
  6. Filesystem and Storage Security
  7. PQC-enhanced encrypted filesystems (e.g., fscrypt, dm-crypt) in long-term archival scenarios.

Practical Use Cases

  1. IoT Devices: Embed PQC verification into firmware signing to protect devices with 10+ year life cycles.
  2. VPN and Secure Tunneling: WireGuard or IPsec with hybrid post-quantum key exchanges to protect against harvest-now, decrypt-later attacks.
  3. Kernel Module Security: Use PQC algorithms for kernel module signing and verification, especially on high-assurance systems.
  4. Long-Term Storage: Files encrypted today may still need to be secure in 20–30 years—PQC strengthens archival encryption.

Objectives

  • Identify kernel subsystems and integration points where PQC support can be introduced with minimal disruption.
  • Provide initial examples and guidelines for developers interested in contributing PQC support.
  • Encourage collaborative exploration in the open-source community to build a quantum-safe future for the Linux kernel.

URLs