DescriptionAbstract: The realization of quantum computers is going to jeopardize the very fabric of security protocols widely deployed today. The urgency of finding alternate solutions that are secure against the cryptanalytic attacks of today's computing machines as well as against the quantum computers has been rightly addressed by NIST, who started a standardization process for post-quantum cryptography (PQC), with first round submissions due in November last year. Implementations of PQC requires addressing various specific and unique challenges such as tackling larger parameter sets, as well as several new arithmetic blocks, e.g., efficient Discrete Gaussian samplers, fast Number theoretic transforms (NTTs) and compact cryptographic Hashes as well as side channel attacks (SCA) resilience. Since these algorithms will be deployed to fit on target applications ranging from as resource constrained as RFID cards and as powerful as multi gigabit data crunchers on large mainframes, a one-fits-all 'silver bullet' kind of solution simply does not exist. In view of this increasingly critical change of world wide security, this tutorial will educate and highlight some initial efforts related to hardware and software implementations of post quantum algorithms. We will discuss the software libraries for PQC, approaches to achieve side-channel resistant implementations and the main bottlenecks designers face when implementing post quantum algorithms on several implementation platforms.
|Period||19 Oct 2018|
|Held at||The London Office for Rapid Cybersecurity Advancement (LORCA), United Kingdom|
|Degree of Recognition||National|