Paper 2019/1277

Towards Quantum-Safe VPNs and Internet

Maran van Heesch, Niels van Adrichem, Thomas Attema, and Thijs Veugen


Estimating that in 10 years time quantum computers capable of breaking public-key cryptography currently considered safe could exist, this threat is already eminent for information that require secrecy for more than 10 years. Considering the time required to standardize, implement and update existing networks signifies the urgency of adopting quantum-safe cryptography. In this work, we investigate the trade-off between network and CPU overhead and the security levels defined by NIST. To do so, we integrate adapted OpenSSL libraries into OpenVPN, and perform experiments on a large variety of quantum-safe algorithms for respectively TLS versions 1.2 and 1.3 using OpenVPN and HTTPS independently. We describe the difficulties we encounter with the integration and we report the experimental performance results, comparing setting up the quantum-safe connection with setting up the connection without additional post-quantum cryptography.

Available format(s)
Publication info
Preprint. MINOR revision.
Contact author(s)
niels vanadrichem @ tno nl
2019-11-05: received
Short URL
Creative Commons Attribution


      author = {Maran van Heesch and Niels van Adrichem and Thomas Attema and Thijs Veugen},
      title = {Towards Quantum-Safe VPNs and Internet},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1277},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.