PQC Algorithms
Since Camel 4.12
Only producer is supported
The PQC component supports signing and verifying payload using Post Quantum Cryptography algorithms.
Prerequisites
URI Format
pqc://label[?options]
You can append query options to the URI in the following format:
?options=value&option2=value&…
Configuring Options
Camel components are configured on two separate levels:
-
component level
-
endpoint level
Configuring Component Options
At the component level, you set general and shared configurations that are, then, inherited by the endpoints. It is the highest configuration level.
For example, a component may have security settings, credentials for authentication, urls for network connection and so forth.
Some components only have a few options, and others may have many. Because components typically have pre-configured defaults that are commonly used, then you may often only need to configure a few options on a component; or none at all.
You can configure components using:
-
the Component DSL.
-
in a configuration file (
application.properties
,*.yaml
files, etc). -
directly in the Java code.
Configuring Endpoint Options
You usually spend more time setting up endpoints because they have many options. These options help you customize what you want the endpoint to do. The options are also categorized into whether the endpoint is used as a consumer (from), as a producer (to), or both.
Configuring endpoints is most often done directly in the endpoint URI as path and query parameters. You can also use the Endpoint DSL and DataFormat DSL as a type safe way of configuring endpoints and data formats in Java.
A good practice when configuring options is to use Property Placeholders.
Property placeholders provide a few benefits:
-
They help prevent using hardcoded urls, port numbers, sensitive information, and other settings.
-
They allow externalizing the configuration from the code.
-
They help the code to become more flexible and reusable.
The following two sections list all the options, firstly for the component followed by the endpoint.
Component Options
The PQC Algorithms component supports 9 options, which are listed below.
Name | Description | Default | Type |
---|---|---|---|
Component configuration. | PQCConfiguration | ||
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. | false | boolean | |
Required The operation to perform. Enum values:
| PQCOperations | ||
Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc. | true | boolean | |
Autowired The KeyPair to be used. | KeyPair | ||
In case there is no signer, we specify an algorithm to build the KeyPair or the Signer. | String | ||
Autowired The Signer to be used. | Signature | ||
Used for enabling or disabling all consumer based health checks from this component. | true | boolean | |
Used for enabling or disabling all producer based health checks from this component. Notice: Camel has by default disabled all producer based health-checks. You can turn on producer checks globally by setting camel.health.producersEnabled=true. | true | boolean |
Endpoint Options
The PQC Algorithms endpoint is configured using URI syntax:
pqc:label
With the following path and query parameters:
Query Parameters (5 parameters)
Name | Description | Default | Type |
---|---|---|---|
Required The operation to perform. Enum values:
| PQCOperations | ||
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. | false | boolean | |
Autowired The KeyPair to be used. | KeyPair | ||
In case there is no signer, we specify an algorithm to build the KeyPair or the Signer. | String | ||
Autowired The Signer to be used. | Signature |
Supported Algorithms
The component supports the following algorithms for signature and verification.
Standardized and implemented
-
ML-DSA
-
SLH-DSA
-
LMS
-
XMSS
Experimental and non-standardized
-
Falcon
-
Picnic
-
Rainbow
General Behavior
The component expects to find a KeyPair and a Signature Objects in to the Camel Registry.
In case the KeyPair and the Signature Objects are not in the registry, it will provide two instances of the Objects with default implementation.
This will be true for standardized algorithms and not for experimental ones.
Examples
-
ML-DSA
from("direct:sign").to("pqc:sign?operation=sign").to("mock:sign").to("pqc:verify?operation=verify")
.to("mock:verify");
With the following beans registered in the Registry
@BindToRegistry("Keypair")
public KeyPair setKeyPair() throws NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException {
KeyPairGenerator kpGen = KeyPairGenerator.getInstance("ML-DSA", "BC");
kpGen.initialize(MLDSAParameterSpec.ml_dsa_65);
KeyPair kp = kpGen.generateKeyPair();
return kp;
}
@BindToRegistry("Signer")
public Signature getSigner() throws NoSuchAlgorithmException {
Signature mlDsa = Signature.getInstance("ML-DSA");
return mlDsa;
}
This could be done even without the Registry beans, by specifying the signatureAlgorithm
parameter in the following way
from("direct:sign").to("pqc:sign?operation=sign&signatureAlgorithm=MLDSA").to("mock:sign")
.to("pqc:verify?operation=verify&signatureAlgorithm=MLDSA")
.to("mock:verify");
With this approach the component will use the class org.apache.camel.component.pqc.crypto.PQCDefaultMLDSAMaterial
, which will create the Signature and KeyPair objects to be used.
The Spec used for the KeyPair will be, in this case, ML-DSA-65
.
-
SLH-DSA
from("direct:sign").to("pqc:sign?operation=sign").to("mock:sign").to("pqc:verify?operation=verify")
.to("mock:verify");
With the following beans registered in the Registry
@BindToRegistry("Keypair")
public KeyPair setKeyPair() throws NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException {
KeyPairGenerator kpGen = KeyPairGenerator.getInstance("SLH-DSA", "BC");
kpGen.initialize(SLHDSAParameterSpec.slh_dsa_sha2_128s);
KeyPair kp = kpGen.generateKeyPair();
return kp;
}
@BindToRegistry("Signer")
public Signature getSigner() throws NoSuchAlgorithmException {
Signature slhDsa = Signature.getInstance("SLH-DSA");
return slhDsa;
}
This could be done even without the Registry beans, by specifying the signatureAlgorithm
parameter in the following way
from("direct:sign").to("pqc:sign?operation=sign&signatureAlgorithm=SLHDSA").to("mock:sign")
.to("pqc:verify?operation=verify&signatureAlgorithm=SLHDSA")
.to("mock:verify");
With this approach the component will use the class org.apache.camel.component.pqc.crypto.PQCDefaultSLHDSAMaterial
, which will create the Signature and KeyPair objects to be used.
The Spec used for the KeyPair will be, in this case, SLH-DSA-SHA2-128s
.
-
LMS
from("direct:sign").to("pqc:sign?operation=sign").to("mock:sign").to("pqc:verify?operation=verify")
.to("mock:verify");
With the following beans registered in the Registry
@BindToRegistry("Keypair")
public KeyPair setKeyPair() throws NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException {
KeyPairGenerator kpGen = KeyPairGenerator.getInstance("LMS", "BC");
kpGen.initialize(new LMSKeyGenParameterSpec(LMSigParameters.lms_sha256_n32_h5, LMOtsParameters.sha256_n32_w1));
KeyPair kp = kpGen.generateKeyPair();
return kp;
}
@BindToRegistry("Signer")
public Signature getSigner() throws NoSuchAlgorithmException {
Signature lms = Signature.getInstance("LMS");
return lms;
}
This could be done even without the Registry beans, by specifying the signatureAlgorithm
parameter in the following way
from("direct:sign").to("pqc:sign?operation=sign&signatureAlgorithm=LMS").to("mock:sign")
.to("pqc:verify?operation=verify&signatureAlgorithm=LMS")
.to("mock:verify");
With this approach the component will use the class org.apache.camel.component.pqc.crypto.PQCDefaultLMSMaterial
, which will create the Signature and KeyPair objects to be used.
The Parameters used will be LMS-SHA256-N32-H5
for the signature and SHA256-n32-w1
for the one-time signature.
-
XMSS
from("direct:sign").to("pqc:sign?operation=sign").to("mock:sign").to("pqc:verify?operation=verify")
.to("mock:verify");
With the following beans registered in the Registry
@BindToRegistry("Keypair")
public KeyPair setKeyPair() throws NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException {
KeyPairGenerator kpGen = KeyPairGenerator.getInstance("XMSS", "BCPQC");
kpGen.initialize(new XMSSParameterSpec(10, XMSSParameterSpec.SHA256), new SecureRandom());
KeyPair kp = kpGen.generateKeyPair();
return kp;
}
@BindToRegistry("Signer")
public Signature getSigner() throws NoSuchAlgorithmException {
Signature xmss = Signature.getInstance("XMSS");
return xmss;
}
This could be done even without the Registry beans, by specifying the signatureAlgorithm
parameter in the following way
from("direct:sign").to("pqc:sign?operation=sign&signatureAlgorithm=XMSS").to("mock:sign")
.to("pqc:verify?operation=verify&signatureAlgorithm=XMSS")
.to("mock:verify");
With this approach the component will use the class org.apache.camel.component.pqc.crypto.PQCDefaultXMSSMaterial
, which will create the Signature and KeyPair objects to be used.
The Parameters used will be 10
as tree height and SHA-256
for the tree digest.