DNS Quantum Computing
The problem posed by quantum computers
Quantum computers affect even core Internet standards such as DNSSEC. At its core, DNSSEC is dependent on public key cryptography, that is asymmetric cryptography based on a mathematical relationship between the private and public keys. This mathematical relationship can for most algorithms not realistically be broken by conventional computers.
However, quantum computers can theoretically crack most asymmetric algorithms in use today. But implementations of quantum computers with that power are likely at least a decade away, if not several decades.
Since changing the keys and algorithms used for the DNS system, and especially the root zone, is likely to take quite a long time, we need to get started today,
Just changing the keys for the root zone took five years, we have to get started with this already today.
Ulrich Wisser
Longer keys are (possibly) needed
One of the more substantial issues with quantum resistant asymmetric cryptography is the key length necessary. In technical terms, it is inconvenient if DNS-packets with DNSSEC contents are longer than 1500 bytes including all headers. 1500 bytes with headers is the realistic limit for UDP packets over the Internet. For non-EDNS-compliant name servers the packet length is even shorter, just 512 bytes.
Longer keys would require DNS-request to be handled via TCP, which requires additional overhead compared to UDP. Also worth noting, in technical terms, the DNS protocol itself cannot handle DNS-packets longer than 64k bytes, which sets a hard limit for the size of the keys used in DNSSEC public key cryptography.
Today, most available quantum resistant ciphers have key lengths on the far end of 1500 bytes, so algorithms would have to be improved before large scale implementations to account for the increased efficiency of UDP queries.
However, Ulrich argues that the DNSSEC community in general does not need to consider at this time, but notes that TLS- and QUIC-based DNS-protocols usage should be aligned with current best practice quantum resistant cryptography over time.
Summary
In the larger picture quantum cryptography is going to affect the way DNSSEC is done, but there is no need to hurry yet for the DNSSEC community. There is, however, a need to start thinking about shifting to quantum resistant algorithms over time.
Link to presentation (Youtube)