NIST logo
*
Bookmark and Share

Workshop on Cybersecurity in a Post-Quantum World

Purpose:

The advent of practical quantum computing will break all commonly used public key cryptographic algorithms. In response, NIST is researching cryptographic algorithms for public key-based key agreement and digital signatures that are not susceptible to cryptanalysis by quantum algorithms. NIST is holding this workshop to engage academic, industry, and government stakeholders. The Post Quantum Workshop will be held on April 2-3, 2015, immediately following the 2015 International Conference on Practice and Theory of Public-Key Cryptography. NIST seeks to discuss issues related to post-quantum cryptography and its potential future standardization.

Accepted Presentations  Call for Papers


Agenda:

Thursday, April 2, 2015

9:00am - 9:10am Opening Remarks
Donna F. Dodson, ITL Associate Director, Chief Cybersecurity Advisor, and Director of the National Cybersecurity Center of Excellence
9:10am - 10:30am

Session I: Multivariate and Code-based Cryptosystems
Session Chair: Daniel Smith-Tone, NIST

  1. Gui: Revisiting Multivariate Digital Signature Schemes based on HFEv-
    presented by: Jintai Ding, University of Cincinnati
  2. QC-MDPC-McEliece: A public-key code-based encryption scheme
    presented by: Nicolas Sendrier, Jean-Pierre Tillich, Rafael Misoczki, Paulo Barreto
  3. A New Code Based Public Key Encryption and Signature Scheme based on List Decoding
    presented by: Danilo Gligoroski, NTNU
  4. Rank based Cryptography: a credible post-quantum alternative to classical crypto
    presented by: Philippe Gaborit, University of Limoges
10:30am - 11:00am Coffee Break
11:00am - 11:50am

Session II: Invited talk by Bart Preneel, Katholieke Universiteit Leuven
Introduced by: Dustin Moody, NIST

  1. Title
11:50pm - 12:50pm

Session III: Higher level protocols
Session chair: Rene Peralta, NIST

  1. Post-quantum key exchange for the TLS protocol from RLWE problem
    presented by: Craig Costello, Microsoft
  2. Future Anonymity in Today’s Budget (Post-Quantum Secure Onion Routing)
    presented by: Aniket Kate, CISPA, Saarland University
  3. A quantum-safe circuit-extension handshake for Tor
    presented by:
12:50pm - 2:00pm Lunch
2:00pm - 2:50pm

Session IV: Invited Talk by David McGrew, Cisco Systems
Introduced by: Rene Peralta, NIST

  1. Title
2:50pm - 3:20pm Coffee Break
3:20pm - 4:20pm

Session V: Hash-based Signature Schemes
Session chair: Ray Perlner, NIST

  1. Hash-based Signatures: An outline for a new standard
    presented by: Andreas Hulsing, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
  2. SPHINCS: practical stateless hash-based signatures
    presented by: Daniel Bernstein, Daira Hopwood, Andreas Hulsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O’Hearn
  3. Let Live and Let Die - Handling the state of Hash-based signatures
    presented by: Stefan-Lukas Gazdag, Genua mbh
4:20pm - 5:20pm

Session VI: Panel: Shoring up the Infrastructure: A strategy for Standardizing Hash Signatures
Moderator: Burt Kaliski, Verisign

Panelists:

  • Andreas Hulsing, TU Eindhoven
  • David McGrew, Cisco Systems 
  • Aziz Mohaisen, Verisign Labs
  • Russ Housley, Virgil Security

 

Friday, April 3, 2015

9:00am - 11:00am

Session VII: Topics in Post-Quantum Cryptography
Session chair: Stephen Jordan, NIST

  1. Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates
    presented by: Dan Shumow, Microsoft
  2. Failure is not an option: Standardization issues for Post-Quantum key Agreement
    presented by: Brad Lackey, Department of Defense
  3. PQCrypto project in the EU
    presented by: Tanja Lange, TU Eindhoven
  4. MQ Challenge: Hardness Evaluation of Solving MQ problems
    presented by: Takanori Yasuda, Institute of Systems, Information Technologies and Nanotechnologies
  5. Renaissance of Pre-computation in a Post-Quantum World
    presented by: Aydin Aysu, Virginia Tech
  6. DTLS-HIMMO: Efficiently Securing PQ world with a fully-collusion resistant KPS
    presented by: Oscar Garcia-Morchon, Phillips Group Innovation
11:00am - 11:30am Coffee Break
11:30am - 12:20pm

Session VIII: Invited talk by Michele Mosca, University of Waterloo
Introduced by: Lily Chen, NIST

  1. Title
12:20pm - 1:20pm Lunch
1:20pm - 3:00pm

Session IX: Key Management, and Lattice-based Cryptography
Session chair: Dustin Moody, NIST

  1. Panel: Key Management for Quantum-safe Cryptography
    Moderator: Robert Griffin, RSA
    Panelists:
    • Elizabeth O’Sullivan, Queen’s University Belfast
    • Sean Parkinson, RSA
    • Gregoire Ribordy, ID Quantique
    • William Whyte, Security Innovation
  2. Practical Lattice-based Digital Signature Schemes
    presented by: James Howe, Thomas Poppelmann, Maire O’Neill, Elizabeth O’Sullivan, Tim Guneysu
  3. Post-quantum Authenticated Key Exchange from Ideal Lattices
    presented by: Jintai Ding, University of Cincinnati 
3:00pm - 3:30pm Coffee Break
3:30pm - 5:00pm

Session X: Quantum and classical cryptanalysis
Session chair: Yi-Kai Liu, NIST

  1. Invited talk by Paul Lopata, University of Maryland
  2. Grobner Bases Techniques in Post-Quantum Cryptography
    presented by Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska
  3. Trapdoor simulation of quantum algorithms
    presented by: Tung Chou, Daniel Bernstein

 

Invited Speakers

Paul Lopata Laboratory for Physical Sciences, University of Maryland Topic: TBD

David McGrew Cisco Systems Topic: Post-quantum key exchange protocols, hash-based signature schemes

Michele Mosca Institute for Quantum Computing, University of Waterloo, Canada Topic: TBD

Bart Preneel Electrical Engineering Department, Katholieke Universiteit Leuven, Belgium Topic: TBD

Details:

Start Date: Thursday, April 2, 2015
End Date: Friday, April 3, 2015
Audience: Industry, Government, Academia
Format: Workshop

Registration:

Registration Fees:
$95.00 (includes coffee breaks/refreshments)
$60.00 (no coffee breaks/refreshments)

All attendees must be pre-registered to gain entry to the NIST campus. Photo identification must be presented at the main gate to be admitted to the conference. International attendees are required to present a passport. Attendees must wear their conference badge at all times while on the campus.

Registration will close March 26, 2015 at 5:00 PM EST. There is no on-site registration for meetings held at NIST.

Registration Contact:

Teresa Vicente, 301-975-3883

Accommodations:

A block of rooms has been reserved at the Gaithersburg Marriott Washingtonian Center at a special rate of $134 USD plus tax. Reservations must be received no later than March 5, 2015.

9751 Washingtonian Blvd
Gaithersburg, MD 20878
Phone: 301-258-6534

Online reservations
or call 1-800-393-3450
Please reference "NIST Post Quantum Workshop Room Block"

Shuttle
NIST will provide a shuttle between the hotel and NIST in the morning and at the end of the meeting each day.


Security Information:
You will need a government-issued photo ID (e.g., passport or driver's license) when you check into the Visitors Center at the entrance of NIST. If you will be driving, please bring your Vehicle Registration card also.

PLEASE NOTE: Effective July 21, 2014, under the REAL ID Act of 2005 (http://www.dhs.gov/real-id-public-faqs), agencies, including NIST, can only accept a state-issued driver's license or identification card for access to federal facilities if issued by states that are REAL ID compliant or have an extension. More info

Technical Contact:

Technical Inquiries
pqc2015@nist.gov

General Workshop Inquiries
sara@nist.gov