SLIDE 1 Karol Nemoga Vojenské spravodajstvo
Brunovce , 26. September 201
SLIDE 2
Dec 2013 – Dec 2016 NPD: Otokar Grosek, SK PPD: Eran Tromer, IL CoD: Rainer Steinwandt, US CoD: Viktor Fischer,FR NIST (US National Institute of Standard and
Technology) announced: Post-Quantum Project submissions for quantum resistant PKC algorithm, deadline Nov 30, 2017
Brunovce, 26. September 2018
SLIDE 3 SK Team FEI STU Prof. Grosek + 5 members
NATO “Godfather” Karol Nemoga, SK END Users 2013
- Military Intelligence, Ministry of Defence, Slovakia
- NSA Slovakia
- ST Microelectronics, France
- First Data Corporation, USA
Brunovce, 26. September 2018
SLIDE 4 Project - identified secure parameter sets
and implementations for asymmetric encryption and digital signatures in a post- quantum setting:
- On the cryptanalytic side, our objective is to identify realistic
assumptions and parameter sets that can withstand a well-funded attacker
- On the implementation side, our objective is to provide
implementations which can withstand common side-channel attacks, including physical (power analysis, electromagnetic analysis, etc.) and software-based
- Collecting the results, identification of methods which are able to
withstand side-channel attacks and which offer long term security in a post-quantum environment
Brunovce, 26. September 2018
SLIDE 5 Several Meetings/Conferences of the Project Scientific project, main results - formaly
(LNCS series Proc., Quantum Inform. Process., IEEE journals, ACM journals, …)
- 22 Conference presentations
(Crypto, CHES, SAC, ACNS, ACM, PQC, …)
Brunovce, 26. September 2018
SLIDE 6 Research/results on McEliece cryptosystem Side channel attacks, McEliece, general
systems
results, identification of methods and params
which are able to withstand side-channel attacks, with long term security in a post- quantum environment
Side products –
- Acoustic attacks
- Ground attacks
- Emanation attacks (0.5m from PC )
Brunovce, 26. September 2018
SLIDE 7
Tel Aviv University, September 26-31, 2016 O. Grosek, V. Fischer Trajan Horse Inst Math ISEG Meeting, February 2017
SLIDE 8
Thomas Eisenbarth: Side Channel Analysis for
McEliece Implementations
Pierre-Louis Cayrel: Side Channel Analysis of
the McEliece PKC Using Binary Goppa Codes
Rainer Steinwandt: Understanding the Cost of
Grover's Algorithm for Finding a Secret Key
David Naccache, Remi Geraud: Thrifty Zero-
Knowledge When Linear Programming Meets Cryptography
ISEG Meeting, February 2017
SLIDE 9 Pavol Zajac: McEliece in Practice Viliam Hromada: Side Channel Analysis of
McEliece Cryptosystem
Eran Tromer: Physical Side Channel Attacks
Cetin Kaya Koc: Hardware Trojans in
Incompletely Specified Digital Systems
Boaz Tsaban: Nonabelian Cryptosystems, for
a Change?
ISEG Meeting, February 2017
SLIDE 10 Oscar Reparaz: Side-Channel
Countermeasures for Lattice-Based Post
- Quantum Cryptographic Implementations
Dorian Goldfeld: Quantum Resistant Group
Theoretic Public Key Methods
ISEG Meeting, February 2017
SLIDE 11
P.-L. Cayrel, E. Tromer Rainer Steinwandt Çetin Kaya Koç
ISEG Meeting, February 2017
SLIDE 12 Workshop for Call I, June 7-8, NATO HQ,
Brussels
Profs. Grosek (SK), Steinwandt (US), Kiraz (Turkey) NATO: Dr. Deniz Beten, Dr. Catharina Candolin NATO ISEG: Nemoga (SK), Souza (Port.), Unal (Tur)
SPS CYBER DEFENCE CLUSTER WORKSHOP,
December 11, NATO HQ Brussels
Profs. Zajac (SK), Ziman (SK), Kiraz (Turkey), Baykal (Tur) NATO: Dr. Deniz Beten, Dr. Catharina Candolin, Illimar Lepik von Wirén (NATO CCDCOE Center of Excellence, Tallin) NATO ISEG: Nemoga (SK), Souza (Port.), Unal (Tur), Ionita (RO), Muylaert (Belg)
Brunovce, 26. September 2018
SLIDE 13 Winner of NATO Call (4 projects from 22
proposals)
Oct 2018 – Sept 2021 NPD: Otokar Grosek, SK PPD: Christian Colombo, Malta CoD: Rainer Steinwandt, US CoD: Maria Isabel Gonzales Vasco, Spain NATO “Godfather” Karol Nemoga, SK SK Team Prof. Grosek + 5 researchers END Users:
- Military Intelligence, Ministry of Defense, SK
- Centro Criptologico Nacional, Madrid
- Rhode&Schwarz Cybersecurity, Berlin
Brunovce, 26. September 2018
SLIDE 14 This proposal will
- design ,
- analyze ,
- Implement
PQ solutions to securely establish cryptographic keys among a group of participants.
Cryptographic theory to establish structural
guarantees at the protocol level and explore performance through implementation on different platforms.
Hardness assumptions are chosen to be quantum-
safe (based on coding theory or/and lattices).
Brunovce, 26. September 2018
SLIDE 15
Develop general techniques and concrete efficient
protocols for quantum-safe authenticated group key establishment (AGKE).
Develop techniques for securely implementing
quantum-safe AGKE protocols and provide actual secure implementations on different target platforms.
efficient solutions using either lattice techniques or
tools from code-based cryptography
Brunovce, 26. September 2018
SLIDE 16 Start -lattice-based2-party protocol with
constructions using coding theory.
Next work-plan
ice of
rity model
lement ntat ation ion security rity of cryptographic raphic primitive itives
ntif ify candidat idate protocol
entify ify protocol-lev evel el securit rity mechan anism isms
col and parameter r optimiza ization ion
loy implement ntat ation ion-le level security rity mecha hanism nisms
Brunovce, 26. September 2018
SLIDE 17
Brunovce, 26. September 2018