Skip to main content
Skip table of contents

Tutorial – Issue a PQC Hybrid End Entity Certificate with ML-KEM

In this tutorial, you will learn how to use a post-quantum hybrid PKI to issue an ML-KEM end entity certificate. Since the CA is hybrid, the end entity certificate will also be hybrid, in this case this means being signed using both the classic signature algorithm and the post-quantum ML-DSA algorithm.

The tutorial covers these steps: 

  • Create an End Entity​

  • Create a CMP Alias​

  • Create a CRMF Request​ and Issue a Certificate using CMP​

  • View the Issued Certificate using OpenSSL

Prerequisites

For this tutorial, EJBCA Enterprise container version 9.2 was used.

This tutorial is also valid for the EJBCA Community container version 9.1 or higher. However, the EJBCA cmpclient is only delivered with EJBCA Enterprise, so if you are a Community user, you need to use your own CMP client instead.

Before you begin, you need:

A running EJBCA instance - Click to learn more

If you don’t already have EJBCA installed, here are some options for you:

Step 1 - Create an End Entity

To create an end entity, follow these steps:

  1. In EJBCA, under RA Functions, click Add End Entity.

  2. In the End Entity Profile list, select EMPTY.

The EMPTY End Entity Profile should only be used for testing purposes. In a production environment, you would first create a new End Entity Profile. For more information, see https://docs.keyfactor.com/ejbca/latest/end-entity-profile-operations.

  1. In the Username field, add a name for the new end entity, in this example cmpencert.

  2. In the Password field, enter a one-time enrollment code. Repeat the code in Confirm Password.

  3. In the Common Name field, enter a name, in this example the same as the Username, that is, cmpencert.

  4. In the CA list, select the issuing CA, in this example PQCSub.

  5. Click Add to create the end entity.

You have now created an end entity and can continue with creating a CMP Alias.

Step 2 - Create a CMP Alias

A CMP endpoint also needs to be configured. In EJBCA, this is done by creating a CMP Alias.

To create a CMP Alias, follow these steps:

  1. In EJBCA, under System Configuration, click CMP Configuration.

  2. Under List of CMP Aliases, click Add.

  3. In the Name field, enter a name, in this example cmp.

  4. In CMP Operational Mode, click Client Mode.

  5. In CMP Authentication Module, select HMAC.

  6. In the Extract Username Component list, select CN.

  7. In CMP Response Additional CA Certificates, clear Use.

  8. Click Save.

You have now created a CMP endpoint and can now go on to issue an end entity certificate.

Step 3 - Create a CRMF Request​ and Issue a Certificate using CMP

When issuing an end entity certificate from a hybrid CA, the certificate will also be hybrid, meaning that it is signed by both CA keys. The certificate request will include indirect Proof-of-Possession, meaning that the certificate is sent back encrypted to the client. For more information, see RFC 4211.

In this example, the EJBCA cmpclient is used. If you run EJBCA Community, you can request a certificate in a similar way with your own CMP client.

To create a Certificate Request Message Format (CRMF) and issue a certificate using the EJBCA cmpclient, follow these steps:

  1. In your terminal, navigate to the cmpclient tool, in this example to /Dev/git/ejbca/dist/cmpclient.

  2. Create a CRMF, using the CMP Alias URL, the End Entity Common Name and Password for the HMAC authentication, the requested key pair for the key encapsulation mechanism to ML-KEM-512, and the includedpopo flag to include proof of possession:

    CODE
    $cmpclient.sh crmf --url http://localhost/ejbca/publicweb/cmp/cmp --dn "CN=cmpencert" --authparam foo234 --reqnewkeyspec ML-KEM-512 --includepopo --v
  3. The output is similar to the following. Note that the certificate is decrypted with the ML-KEM-512 private key:

    CODE
    Creating CRMF request with: SubjectDN=CN=cmpencert
    Creating CRMF request with: IssuerDN=null
    Creating CRMF request with: AuthenticationModule=null
    Creating CRMF request with: EndEntityPassword=
    Creating CRMF request with: SubjectAltName=null
    Creating CRMF request with: CustomCertSerno=
    Creating CRMF request with: IncludePopo=true
    Creating CRMF request with: requestValidity=null
    Creating CRMF request with: keyID=null
    Added POP of type: 2 - encrCert
    Using default authentication module: HMAC
    Creating protected PKIMessage using: authentication module=HMAC, authentication parameter=foo234
    Using CMP URL: http://localhost/ejbca/publicweb/cmp/cmp
    Using default destination directory: ./dest/
    Decrypting returned certificate with private key of type ML-KEM-512
    CRMF request successful. Received certificate stored in dest/cmpencert.pem
    Generated private key stored in dest/cmpencert-key.pem

You have now issued an end entity certificate and can view it using OpenSSL.

Step 4 - View the Issued Certificate

In the video tutorial, the open quantum-safe provider is used with OpenSSL. However, this provider is no longer updated for OpenSSL version 3.5 or later. Code examples are given both with and without the oqsprovider. OpenSSL from version 3.5 includes native support for ML-DSA and ML-KEM.

To view the stored certificate, follow these steps:

  1. View the certificate using OpenSSL with the open quantum-safe provider:

    CODE
    $ openssl x509 -in dest/cmpencert.pem -text -provider oqsprovider -provider legacy --noout

    View the certificate using OpenSSL without the open quantum-safe provider:

    CODE
    $ openssl x509 -in dest/cmpencert.pem -text --noout
  2. In the output, you can note the following:

    • Issuer is PQCSub and the certificate has the subject DN that was configured earlier.

    • Public Key Algorithm shows the official NIST OID for ML-KEM-512. At the moment, OpenSSL is not able to parse this.

    • There are some Extensions for the hybrid end entity certificate.

      CODE
      Certificate:
          Data:
              Version: 3 (0x2)
              Serial Number:
                  0b:63:64:c6:24:4e:39:0d:32:70:6a:76:01:c5:a2:59:c2:14:f2:e2
          Signature Algorithm: ecdsa-with-SHA384
              Issuer: CN=PQCSub
              Validity
                  Not Before: Sep 24 09:53:32 2024 GMT
                  Not After : Sep 24 09:53:31 2025 GMT
              Subject: CN=cmpencert
              Subject Public Key Info:
                  Public Key Algorithm: 2.16.840.1.101.3.4.4.1
                  Unable to load Public Key
      40173D1DF37D0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../crypto/x509/x_pubkey.c:458:            
      40173D1DF37D0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../crypto/x509/x_pubkey.c:458:            
              X509v3 extensions:
                  ...

Next steps

In this tutorial, you learned how to issue a hybrid post-quantum certificate using CMP and ML-KEM algorithm.

Here are some next steps we recommend:

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.