← All articles

Post-Quantum IPsec: Securing VPN Tunnels

The IPsec protocol, combined with the IKEv2 negotiation mechanism, forms the backbone of virtual private networks deployed across enterprises, government agencies, and critical infrastructure operators. From defense ministries to multinational headquarters, interbank networks to industrial SCADA systems, IPsec protects billions of network packets every day carrying classified, financial, and operational data. This ubiquity, which is the protocol's greatest strength, also makes it its largest vulnerability surface in the face of the quantum threat.

The Fundamental Vulnerability: Key Exchange

The weak link in IPsec against quantum computers does not lie in symmetric data encryption — AES-256 remains robust even in a post-quantum context — but in the key exchange mechanism. IKEv2 relies on the Diffie-Hellman (DH) algorithm or its elliptic curve variant (ECDH) to establish a shared secret between two peers. However, Shor's algorithm allows a sufficiently powerful quantum computer to solve the discrete logarithm problem in polynomial time. In concrete terms, an attacker with a CRQC (Cryptographically Relevant Quantum Computer) could reconstruct the session key from the DH parameters exchanged in the clear during IKE negotiation, and decrypt the entire traffic protected by the tunnel.

Harvest Now, Decrypt Later: The Immediate VPN Threat

The Harvest Now, Decrypt Later (HNDL) strategy represents a concrete and current danger to IPsec tunnels. State-level actors are already intercepting encrypted VPN traffic passing through Internet exchange points, submarine cables, and backbone networks. This traffic, stored on a massive scale, can be retroactively decrypted as soon as an operational quantum computer becomes available. For communications whose confidentiality must be maintained beyond 2035 — defense secrets, medical data, strategic intellectual property — the vulnerability window is already open. Every unmigrated IPsec tunnel constitutes a potential source of exploitable data in the near future.

The Solution: Integrating ML-KEM into IKEv2

The technical response to this threat involves integrating post-quantum algorithms into the IKEv2 protocol. NIST standardized the ML-KEM (Module-Lattice-Based Key Encapsulation Mechanism, FIPS 203) in August 2024, designed specifically to replace DH and ECDH key exchanges. IETF work, including drafts on using ML-KEM within IKEv2, defines post-quantum key encapsulation mechanisms within the IKE_SA_INIT and CREATE_CHILD_SA exchanges. The recommended approach is hybrid: combining a classical ECDH exchange with an ML-KEM encapsulation, so that tunnel security is guaranteed even if one of the two algorithms proves vulnerable over time.

The Hardware Approach: FPGA-Based Post-Quantum Encryptors

For high-security environments — defense, government, vital importance operators — software implementation alone is insufficient. FPGA-based network encryptors offer a fundamentally different approach: post-quantum key exchange and symmetric encryption are executed entirely in silicon, without host processor intervention. This architecture eliminates all software attack surface on the cryptographic path. The FPGA handles post-quantum IKEv2 negotiation, ML-KEM encapsulation, session key derivation, and AES-256-GCM packet encryption at line rate with no perceptible latency. Keys never transit through operating system memory, eliminating memory extraction vectors, software side-channel attacks, and kernel compromises.

Migration Path: Hybrid Mode, Testing, and Certification

Migrating an IPsec infrastructure to post-quantum cryptography follows a progressive approach. The first step consists of conducting a comprehensive inventory of deployed VPN tunnels, their cryptographic parameters, and the confidentiality lifespan of the data they carry. Tunnels protecting long-lived data must be migrated as a priority. Deployment in hybrid mode — ECDH + ML-KEM — enables a seamless transition while maintaining interoperability with equipment not yet updated. Testing phases must validate performance under real-world conditions: ML-KEM-1024 encapsulation adds approximately 1,500 bytes to the initial IKE exchange, which may require MTU adjustments on certain links. Finally, for operators subject to NIS2, DORA, or ANSSI security visa requirements, certification of post-quantum equipment is becoming a regulatory prerequisite: starting in 2027, no network encryption product will be granted an ANSSI visa without integrated post-quantum mechanisms.

Securing IPsec VPN tunnels against the quantum threat is not a project to plan for tomorrow. It is an immediate operational imperative. Organizations that anticipate this transition are protecting the confidentiality of their communications now — those that wait are exposing themselves to a risk whose consequences extend well beyond the quantum horizon.

Have questions?

Cryptographic audit, proof of concept, or migration plan — we are here to discuss it.

Let's talk →