Dual Key Tunneling Protocol (DKTP)

Protocol Overview

Dual Key Tunneling Protocol

DKTP is a post quantum secure tunneling protocol designed to replace classical VPN and TLS deployments that depend on certificate authorities and quantum vulnerable key exchange. The protocol establishes an authenticated, bidirectional tunnel by combining two independent entropy sources, a post quantum key encapsulation mechanism and a pre shared symmetric key, into a single deterministic handshake. Each direction derives its own cipher state, producing transmit and receive channels that are cryptographically independent, resilient to partial compromise, and suitable for long lived infrastructure links.

Executive Summary

High level overview of the protocol's purpose, design goals, operational benefits, and the strategic problems it was created to solve.

Open Executive Summary

Formal Analysis

Complete game based security model and proofs for the DKTP protocol, aligned with the QRCS cryptanalysis framework.

Open Formal Analysis

Technical Specification

Engineering specification that defines message formats, roles, cryptographic primitives, and configuration profiles.

Open Technical Specification

Protocol Summary

The Dual Key Tunneling Protocol is a dual entropy transport framework intended for high assurance network links. It combines a post quantum KEM secret with a locally provisioned pre shared secret to derive session keys, then evolves those secrets through deterministic ratcheting. Unlike classical tunnels that share a single negotiated key schedule, DKTP maintains independent transmit and receive cipher states, reducing cross direction leakage and compartmentalizing compromise.

After the handshake completes, all traffic uses authenticated encryption and binds packet metadata as associated data. Sequence numbers, timestamps, and strict validation rules provide replay resistance and state synchronization, supporting deployment in enterprise, embedded, and sovereign environments where auditability and predictable behavior matter as much as confidentiality.

Motivation and Problem Definition

Many deployed VPN and TLS systems inherit structural risks from centralized PKI, long lived certificates, and key exchange mechanisms that are threatened by large scale quantum computation. Even before practical quantum devices, operational failures such as CA compromise, mis issuance, and supply chain interference can undermine the trust model.

DKTP replaces these dependencies with direct peer authentication and locally governed key material. The dual entropy design ensures that breaking the asymmetric component alone is not sufficient, and compromising the symmetric component alone is not sufficient. This provides a practical path for organizations that require sovereign control over tunnel trust, and long term confidentiality for data that must remain protected for decades.

Architecture and Mechanism

DKTP uses a composite handshake in which both peers authenticate, exchange encapsulations, and derive directional keys. Each peer maintains local identity and provisioning material, and stores the remote peer’s public encryption and verification keys. During the exchange, the protocol produces two shared secrets and then derives separate transmit and receive keys, ensuring strict directionality of cryptographic state.

Once established, the tunnel protects application traffic using the QRCS symmetric cipher stack with authenticated encryption. Packet headers are treated as associated data so that routing and control metadata are integrity protected alongside the payload. Deterministic ratcheting evolves the pre shared secret using hash based derivation so that each session advances state irreversibly, supporting forward secrecy and post compromise recovery.

DKTP binds the cryptographic profile to a fixed configuration string that includes the KEM, signature scheme, hash family, and cipher selection. This enables strict negotiation, prevents downgrade behavior, and makes deployments reproducible across systems that require stable compliance baselines.

Security Model and Post Quantum Posture

DKTP assumes an active network adversary capable of interception, injection, replay, and quantum accelerated search. Mutual authentication is enforced through post quantum signatures, while confidentiality and key freshness are derived from ephemeral KEM contributions combined with a provisioned symmetric secret. Independent channel states prevent a compromise in one direction from automatically exposing the other.

Replay and reordering are constrained by explicit sequence and time controls validated at the tunnel boundary. The design favors deterministic processing and explicit state handling, making the protocol auditable, suitable for constrained environments, and aligned with implementation practices that emphasize constant time comparisons and memory zeroization.

Applications and Use Cases

DKTP is suited to environments that require authenticated tunnels without external PKI dependency:

  • Enterprise and cloud protect east west traffic between services with mutual authentication and predictable tunnel state.
  • Finance and payments secure links between terminals, gateways, and authorization infrastructure without certificate overhead.
  • Industrial and SCADA wrap deterministic field protocols without disrupting timing assumptions.
  • Government and sovereign networks deploy long lived tunnels governed by locally provisioned trust and controlled cryptographic profiles.
  • IoT and embedded support static provisioning, low overhead operation, and secure updates with periodic ratcheting.

Economic and Operational Value

DKTP reduces operational dependency on certificate issuance, revocation management, and third party trust chains. Its provisioning model supports disconnected environments and simplifies lifecycle control for networks that must remain stable under strict governance.

The dual entropy approach improves resilience against single point failures in cryptographic assumptions and supports long term confidentiality. For operators and acquirers, it represents a practical post quantum transport primitive that can replace or augment classical VPN infrastructure without importing new external trust requirements.

Strategic and Comparative Outlook

Compared to classical VPN and TLS tunnels, DKTP is designed to remain viable under post quantum threat models while minimizing reliance on centralized validation. Direction separated cipher states, deterministic ratcheting, and strict configuration binding provide a transport layer that is both verifiable and easier to govern.

This design positions DKTP as a foundational tunnel mechanism within the QRCS stack, complementing higher level messaging, shell, and relay systems that require consistent authenticated encryption semantics.

Conclusion

DKTP delivers a practical, high assurance tunneling framework for post quantum secure communications. By combining authenticated exchange, dual entropy derivation, independent channel states, and continuous state evolution, it provides forward secrecy, post compromise recovery, and governance friendly deployment.

The protocol is engineered for real world operation across enterprise, embedded, and sovereign networks, with an emphasis on reproducibility, auditability, and long term cryptographic durability.