Brunovce , 26. September 201 Dec 2013 Dec 2016 NPD: Otokar Grosek, - - PowerPoint PPT Presentation

brunovce 26 september 201 dec 2013 dec 2016 npd otokar
SMART_READER_LITE
LIVE PREVIEW

Brunovce , 26. September 201 Dec 2013 Dec 2016 NPD: Otokar Grosek, - - PowerPoint PPT Presentation

Karol Nemoga Vojensk spravodajstvo Brunovce , 26. September 201 Dec 2013 Dec 2016 NPD: Otokar Grosek, SK PPD: Eran Tromer, IL CoD: Rainer Steinwandt, US CoD: Viktor Fischer,FR NIST (US National Institute of Standard


slide-1
SLIDE 1

Karol Nemoga Vojenské spravodajstvo

Brunovce , 26. September 201

slide-2
SLIDE 2

 Dec 2013 – Dec 2016  NPD: Otokar Grosek, SK  PPD: Eran Tromer, IL  CoD: Rainer Steinwandt, US  CoD: Viktor Fischer,FR  NIST (US National Institute of Standard and

Technology) announced: Post-Quantum Project submissions for quantum resistant PKC algorithm, deadline Nov 30, 2017

Brunovce, 26. September 2018

slide-3
SLIDE 3

 SK Team FEI STU Prof. Grosek + 5 members

  • f the team

 NATO “Godfather” Karol Nemoga, SK  END Users 2013

  • Military Intelligence, Ministry of Defence, Slovakia
  • NSA Slovakia
  • ST Microelectronics, France
  • First Data Corporation, USA

Brunovce, 26. September 2018

slide-4
SLIDE 4

 Project - identified secure parameter sets

and implementations for asymmetric encryption and digital signatures in a post- quantum setting:

  • On the cryptanalytic side, our objective is to identify realistic

assumptions and parameter sets that can withstand a well-funded attacker

  • On the implementation side, our objective is to provide

implementations which can withstand common side-channel attacks, including physical (power analysis, electromagnetic analysis, etc.) and software-based

  • Collecting the results, identification of methods which are able to

withstand side-channel attacks and which offer long term security in a post-quantum environment

Brunovce, 26. September 2018

slide-5
SLIDE 5

 Several Meetings/Conferences of the Project  Scientific project, main results - formaly

  • 46 scientific papers

(LNCS series Proc., Quantum Inform. Process., IEEE journals, ACM journals, …)

  • 22 Conference presentations

(Crypto, CHES, SAC, ACNS, ACM, PQC, …)

Brunovce, 26. September 2018

slide-6
SLIDE 6

 Research/results on McEliece cryptosystem  Side channel attacks, McEliece, general

systems

 results, identification of methods and params

which are able to withstand side-channel attacks, with long term security in a post- quantum environment

 Side products –

  • Acoustic attacks
  • Ground attacks
  • Emanation attacks (0.5m from PC )

Brunovce, 26. September 2018

slide-7
SLIDE 7

 Tel Aviv University, September 26-31, 2016  O. Grosek, V. Fischer  Trajan Horse  Inst Math ISEG Meeting, February 2017

slide-8
SLIDE 8

 Thomas Eisenbarth: Side Channel Analysis for

McEliece Implementations

 Pierre-Louis Cayrel: Side Channel Analysis of

the McEliece PKC Using Binary Goppa Codes

 Rainer Steinwandt: Understanding the Cost of

Grover's Algorithm for Finding a Secret Key

 David Naccache, Remi Geraud: Thrifty Zero-

Knowledge When Linear Programming Meets Cryptography

ISEG Meeting, February 2017

slide-9
SLIDE 9

 Pavol Zajac: McEliece in Practice  Viliam Hromada: Side Channel Analysis of

McEliece Cryptosystem

 Eran Tromer: Physical Side Channel Attacks

  • n PCs

 Cetin Kaya Koc: Hardware Trojans in

Incompletely Specified Digital Systems

 Boaz Tsaban: Nonabelian Cryptosystems, for

a Change?

ISEG Meeting, February 2017

slide-10
SLIDE 10

 Oscar Reparaz: Side-Channel

Countermeasures for Lattice-Based Post

  • Quantum Cryptographic Implementations

 Dorian Goldfeld: Quantum Resistant Group

Theoretic Public Key Methods

ISEG Meeting, February 2017

slide-11
SLIDE 11

 P.-L. Cayrel, E. Tromer  Rainer Steinwandt  Çetin Kaya Koç

ISEG Meeting, February 2017

slide-12
SLIDE 12

 Workshop for Call I, June 7-8, NATO HQ,

Brussels

  • Invited speakers

 Profs. Grosek (SK), Steinwandt (US), Kiraz (Turkey)  NATO: Dr. Deniz Beten, Dr. Catharina Candolin  NATO ISEG: Nemoga (SK), Souza (Port.), Unal (Tur)

 SPS CYBER DEFENCE CLUSTER WORKSHOP,

December 11, NATO HQ Brussels

  • Invited speakers

 Profs. Zajac (SK), Ziman (SK), Kiraz (Turkey), Baykal (Tur)  NATO: Dr. Deniz Beten, Dr. Catharina Candolin, Illimar Lepik von Wirén (NATO CCDCOE Center of Excellence, Tallin)  NATO ISEG: Nemoga (SK), Souza (Port.), Unal (Tur), Ionita (RO), Muylaert (Belg)

Brunovce, 26. September 2018

slide-13
SLIDE 13

 Winner of NATO Call (4 projects from 22

proposals)

 Oct 2018 – Sept 2021  NPD: Otokar Grosek, SK  PPD: Christian Colombo, Malta  CoD: Rainer Steinwandt, US  CoD: Maria Isabel Gonzales Vasco, Spain  NATO “Godfather” Karol Nemoga, SK  SK Team Prof. Grosek + 5 researchers  END Users:

  • Military Intelligence, Ministry of Defense, SK
  • Centro Criptologico Nacional, Madrid
  • Rhode&Schwarz Cybersecurity, Berlin

Brunovce, 26. September 2018

slide-14
SLIDE 14

 This proposal will

  • design ,
  • analyze ,
  • Implement

PQ solutions to securely establish cryptographic keys among a group of participants.

 Cryptographic theory to establish structural

guarantees at the protocol level and explore performance through implementation on different platforms.

 Hardness assumptions are chosen to be quantum-

safe (based on coding theory or/and lattices).

Brunovce, 26. September 2018

slide-15
SLIDE 15

 Develop general techniques and concrete efficient

protocols for quantum-safe authenticated group key establishment (AGKE).

 Develop techniques for securely implementing

quantum-safe AGKE protocols and provide actual secure implementations on different target platforms.

 efficient solutions using either lattice techniques or

tools from code-based cryptography

Brunovce, 26. September 2018

slide-16
SLIDE 16

 Start -lattice-based2-party protocol with

constructions using coding theory.

 Next work-plan

  • Choice

ice of

  • f securit

rity model

  • Imple

lement ntat ation ion security rity of cryptographic raphic primitive itives

  • Ident

ntif ify candidat idate protocol

  • Ident

entify ify protocol-lev evel el securit rity mechan anism isms

  • Protoco

col and parameter r optimiza ization ion

  • Deploy

loy implement ntat ation ion-le level security rity mecha hanism nisms

Brunovce, 26. September 2018

slide-17
SLIDE 17

Brunovce, 26. September 2018