Evaluating post-quantum cryptography in DNSSEC signing for top-level domain operators
The impact on performance for both signing and validation is minimal
Chose your color
Frequently visited
Frequently asked questions
The Whois is an easy-to-use tool for checking the availability of a .nl domain name. If the domain name is already taken, you can see who has registered it.
On the page looking up a domain name you will find more information about what a domain name is, how the Whois works and how the privacy of personal data is protected. Alternatively, you can go straight to look for a domain name via the Whois.
To get your domain name transferred, you need the token (unique ID number) for your domain name. Your existing registrar has the token and is obliged to give it to you within five days, if you ask for it. The procedure for changing your registrar is described on the page transferring your domain name.
To update the contact details associated with your domain name, you need to contact your registrar. Read more about updating contact details.
When a domain name is cancelled, we aren't told the reason, so we can't tell you. You'll need to ask your registrar. The advantage of quarantine is that, if a name's cancelled by mistake, you can always get it back.
One common reason is that the contract between you and your registrar says you've got to renew the registration every year. If you haven't set up automatic renewal and you don't renew manually, the registration will expire.
Wanneer je een klacht hebt over of een geschil met je registrar dan zijn er verschillende mogelijkheden om tot een oplossing te komen. Hierover lees je meer op pagina klacht over registrar. SIDN heeft geen formele klachtenprocedure voor het behandelen van een klacht over jouw registrar.
Would you like to be able to register domain names for customers or for your own organisation by dealing directly with SIDN? If so, you can become a .nl registrar. Read more about the conditions and how to apply for registrar status on the page becoming a registrar.
Domain names
Domain names
The impact on performance for both signing and validation is minimal
The potential arrival of quantum computers threatens many applications of cryptography, including DNSSEC. Since post-quantum cryptographic (PQC) algorithms have very different characteristics compared with algorithms used in DNSSEC today, the transition to PQC will have an operational impact. We have therefore investigated the operational impact of using PQC in DNSSEC signing for top-level domain (TLD) operators.
This blog post is based on a peer-reviewed article, which was published and presented at the Network Traffic Measurement and Analysis Conference TMA2025.
When quantum computers are sufficiently developed, which may take many more years, they will be able to break the forms of cryptography currently in use. That includes the cryptography deployed in DNS, specifically in DNSSEC. Therefore, it is necessary to investigate how DNSSEC can be transitioned to use post-quantum cryptography (PQC), which is cryptography designed with quantum computers’ capabilities in mind. PQC algorithms have different characteristics compared with algorithms used in DNSSEC today (such as RSA or ECDSA), for instance in terms of signature size and verification time. Therefore, DNSSEC’s transition to PQC will have an operational impact. We considered the background to PQC’s relevance to SIDN in an earlier blog post.
In the remainder of this blog post, we discuss our research evaluating PQC for use in DNSSEC signing by top-level domain (TLD) operators.
As the operator of .nl, we are interested in the effects of using post-quantum cryptography on our operations. To measure the impact of PQC, we have analysed the properties and performance of cryptographic algorithms in DNSSEC by signing and verifying zone files. For a TLD operator, signing and verifying a zone file are common operations. Even if, practically, only zone file deltas are signed every half hour, signing the full zone is a good metric for comparing algorithms with each other. We also measured the zone file size, providing us with information about the public key size and signature size of the algorithms.
For DNSSEC signing options, we considered three types of non-existence: NSEC, NSEC3, NSEC3 Opt-Out. For more information on those modes, see RFC 7129.
We tested RSA-1280 (DNSSEC algorithm 8), ECDSA-P256 (DNSSEC algorithm 13), Falcon-512 and MAYO-2. RSA and ECDSA are both algorithms that must be implemented for DNSSEC signing and validation. Both algorithms have a significant share of usage across all TLDs, with ECDSA gaining popularity over RSA. Falcon, a post-quantum algorithm, has been selected for standardisation by NIST. Finally, MAYO is a promising candidate algorithm that is one of the competitors in the NIST process for selecting new post-quantum signature schemes.
We used three zone files as input for our analysis: the .nl, .se and.nu zone files, which we classify as large, medium and small, respectively. The zone files of both .se and .nu are publicly accessible, but the zone file for .nl is not.
Finally, we accounted for hardware acceleration based on CPU features by means of the feature levels of x86-64 architecture. We differentiated between x86-64-v2 and x86-64-v3, which includes AVX and AVX2, two feature flags that we know are used by PQC algorithms.
We then conducted 16 runs, covering all possible combinations of variables.
We found that the impact of PQC algorithms on the DNSSEC signing operations for TLD operators is limited. Let’s highlight a few results for the .nl zone file.
When it comes to signing the entire zone file, we present the results relative to the baseline ECDSA-P256 algorithm (algorithm 13). The results are shown in Figure 1. A ratio of “2.0x” indicates that the tested algorithm is twice as slow as the baseline. We observe that both Falcon and MAYO significantly benefit from hardware acceleration. In terms of hardware-accelerated results, Falcon’s performance is roughly comparable to RSA, while MAYO’s performance is roughly similar to ECDSA-P256.
Figure 1: Increase in signing time for .nl zone compared with the baseline algorithm (algorithm 13, ECDSA-P256). Without (left) and with (right) hardware acceleration.
Figure 2: Increase in validation time for .nl zone compared with the baseline algorithm (algorithm 13, ECDSA-P256). Without (left) and with (right) hardware acceleration.
When we validate the entire zone file, we find that MAYO benefits the most from hardware acceleration. For hardware-accelerated results, the performance of Falcon is comparable to ECDSA-P256 (algorithm 13), while the performance of MAYO is comparable to RSA (algorithm 8). This indicates that the performance of the tested PQC algorithms during zone file validation is comparable to that of currently deployed algorithms.
Figure 3: The size of the .nl zone file when the zone is unsigned, signed with traditional algorithms, and signed with PQC algorithms. Note that the y-axis is logarithmic.
Finally, the zone size shows a relatively large increase for both PQC algorithms, due to their larger signature and public key sizes. Particularly Falcon has larger signatures of 666 bytes, compared with 64 for algorithm 13. This impacts TLD operators, not just in terms of the disk space needed for their authoritative servers, but also in terms of memory consumption (loading the entire zone in memory) and bandwidth.
The results demonstrate that the performance impact on both signing and validation is minimal. That is because the performance of both PQC algorithms is comparable to that of the algorithms currently most widely deployed, provided that hardware acceleration is utilised (x86-64-v3).
Since carrying out the study described here, we have started working on measuring the impact of PQC DNSSEC on DNS resolvers. We will use anonymised traffic traces from a real-world resolver and replay the flow on our testbed. That will allow us to study the impact of PQC DNSSEC on the resolver. For instance, in some cases, DNS messages are too large for a single UDP packet, so DNS falls back on TCP. We want to analyse the impact of resolvers switching to TCP on the experience of the end-user, as well as on the authoritative servers.
You can read the full research paper for a more detailed analysis.
We would love to hear your feedback or comments.
Article by:
Share this article