Post Quantum Cryptography
Provided by QA
Overview
Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.
Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.
Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.
High Level Overview of the class topics;
Prerequisites
General knowledge of cryptography.
+
Delegates will learn how to
You will;
Outline
Day 1
Intro
Attacks Against DLOG and Factoring
Codes
MQ
Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.
Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.
Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.
High Level Overview of the class topics;
- Introduction to post-quantum cryptography
- Attacks on DLOG and factoring
- Lattices and related algorithms
- LWE and Regev's encryption scheme
- NTRU and NTRUPrime
- Codes and cryptosystems
- Isogenies and elliptic curves
- MQ problem and its variants
- Other candidates for PQC
- Side-channel attacks and countermeasures
Prerequisites
General knowledge of cryptography.
+
Delegates will learn how to
You will;
- Be able to evaluate the security of different cryptographic primitives
- Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
- Have practical experience implementing and using post-quantum cryptographic schemes
- Understand the mathematical foundations of post-quantum cryptography
- Be familiar with the state-of-the-art in post-quantum cryptography
- Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations
Outline
Day 1
Intro
Attacks Against DLOG and Factoring
- Shor's Algorithm
- NIST Competition
- Definitions
- SVP, CVP, BDD
- Good and Bad Basis
- Babai Nearest Plane Algorithm
- GGH Schemes and Attack Against Digital Signature Scheme
- LWE
- Regev's Encryption Scheme
- Key Exchange from LWE
- Ring LWE
- Module LWE and LWR
- Frodo, Kyber, Saber
- NTRU and NTRUPrime
- SIS Problem, Hash Function, and Digital Signature from SIS
- Falcon
- Lyubashevskys's ID Scheme
- Dilithium
- IBE and FHE
Codes
- Error Correcting Codes in General
- Goppa Codes, Decoding Algorithm
- McEliece Cryptosystem, Cryptanalysis History
- BIKE and HQC
- Niederreiter Cryptosystem, Syndrome Decoding
- Trapdoor One-Way Function
- Digital Signature Scheme Wave
- Rank Metric Codes and Cryptosystems
- Crash Course on Isogenies and Elliptic Curves
- CGL Hash Function and SIDH
- Security of SIDH, SIKE
- Group Actions, CSIDH, and Applications
- SQISign (High-Level Discussion)
MQ
- MQ Problem
- Discussion about Its Hardness
- Linearization, Gröbner Basis (High-Level Discussion)
- Benchmarking Systems
- Imai-Matsumoto, Hidden Field Equations
- Variants of HFE
- Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
- Rainbow and Cryptanalysis Results for Both UOV and Rainbow
- ID Scheme and GeMSS
- Hash-Based Signatures (SPHINCS+)
- MPC-in-the-Head Signatures (Picnic)
- Basic Attacks
- Countermeasures Against Physical and Implementation Attacks
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | United Kingdom | Book now |
01132207150
01132207150