You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: wolfSSL/src/appendix07.md
+32-43Lines changed: 32 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,51 +44,19 @@ One solution is to not put our full faith into these new algorithms. For now, we
44
44
45
45
The following instructions will get you started from a clean Linux development environment and lead you step by step to performing a quantum-safe TLS 1.3 connection.
46
46
47
-
### Building Open Quantum Safe
47
+
### Build Instructions
48
48
49
-
In order be able to use liboqs, you must have it built and installed on your system. We support the `0.7.0` release of liboqs. You can download it from the following link:
49
+
Please see the wolfSSL repo's INSTALL file (https://github.com/wolfSSL/wolfssl/blob/master/INSTALL). Item 15 (Building with liboqs for TLS 1.3 [EXPERIMENTAL]) has instructions on how to configure and build:
For authentication, you can generate a certificate chain using the Open Quantum Safe project's fork of OpenSSL. We support Dilithium and FALCON certificates and keys generated by the `2021-08 snapshot` of the `OQS-OpenSSL_1_1_1-stable` branch of the fork. You can download it from the following link:
Once unpacked, this would be sufficient for building it:
69
-
70
-
```sh
71
-
cd openssl-OQS-OpenSSL_1_1_1-stable-snapshot-2021-08/
72
-
./config no-shared
73
-
make all
74
-
```
75
-
76
-
**Note**: installation is NOT required.
77
-
78
-
There is a script for generating a FALCON NIST Level 1 and FALCON NIST Level 5 certificate chain which can be found in the `wolfssl-examples` github repo at `pq/generate_falcon_chains.sh.` Please find detailed instructions on how to generate and verify the keys and certificates in `pq/README.md`. As a quick-start, simply copy `generate_falcon_chains.sh` into the `openssl-OQS-OpenSSL_1_1_1-stable-snapshot-2021-08` directory and execute the script. Similarly, we have `pq/generate_dilithum_chains.sh.` which generates Dilithium chains; one chain for each supported variant.
79
-
80
-
Once the certificates and keys are generated, copy them from the `openssl-OQS-OpenSSL_1_1_1-stable-snapshot-2021-08` directory to the `certs` directory of wolfssl.
81
-
82
-
### Building wolfSSL
83
-
84
-
Follow these steps to build wolfSSL with liboqs integration:
85
-
86
-
```sh
87
-
cd wolfssl
88
-
./autogen.sh (Not necessary if configure script is already present)
89
-
./configure --with-liboqs
90
-
make all
91
-
```
55
+
You will need the patched OQS OpenSSL fork in order to generate X.509
56
+
certificates with post-quantum cryptographic keys and signatures. Instructions
57
+
can be found at https://github.com/wolfSSL/osp/tree/master/oqs/README.md. If you
58
+
do not want to use post-quantum signature schemes, you can skip the step of
You have just achieved a fully quantum-safe TLS 1.3 connection using AES-256 for symmetric encryption, the FALCON signature scheme for authentication and ECDHE hybridized with KYBER KEM for key establishment.
114
82
83
+
Further information about other post-quantum examples can be found at
## Naming Convention Mappings Between wolfSSL and OQS's fork of OpenSSL
116
88
117
89
All the teams that made submission to the NIST PQC competition supported multiple levels of security as defined by NIST here: <https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/evaluation-criteria/security-(evaluation-criteria)>
0 commit comments