stork strategic roadmap for k crypto
play

STORK - Strategic Roadmap for (K)Crypto A roadmap project in the - PDF document

STORK - Bart Preneel STORK - Strategic Roadmap for (K)Crypto A roadmap project in the European Commissions IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org Agenda of introductory session T Introduction to STORK T The 6th


  1. STORK - Bart Preneel STORK - Strategic Roadmap for (K)Crypto A roadmap project in the European Commission’s IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org Agenda of introductory session T Introduction to STORK T The 6th Framework Programme (Aniyan Varghese) T NESSIE: Overview 1

  2. STORK - Bart Preneel The Need for FP6 Research Actions in Cryptology T privacy and security are critical success factors for the lift-off of novel applications and technologies T cryptology is a key building block T help Europe stay ahead T avoid fragmentation, proprietary solutions, technology lock-in situations T consistent approach, standardization Cryptology research (1) T area is strategic/interdisciplinary/scattered/complex T cryptographic algorithms S ad hoc and provable security S lightweight/low cost algorithms (e.g. stream ciphers) S new “from scratch” algorithms (e.g. one-way functions) S pseudo-random bit generators S public-key algorithms not based on factoring and discrete logarithm S design and validation (including building blocks) 2

  3. STORK - Bart Preneel Cryptology research (2) T cryptographic protocols S complex settings & requirements: voting, privacy, auction, digital rights management S plug-and-play S entity authentication for extreme environments S dependability /survivability of heterog. wide-area systems S methodologies: reductions, formal methods T unconditionally secure cryptology S quantum models S noisy channels S public randomness New environments T low cost secure bus encryption T ambient intelligence T inexpensive transactions T smart cards T complex interactions T cryptography in a world where large quantum computers exist 3

  4. STORK - Bart Preneel STORK: Objectives T identify gaps between state of the art in cryptology research and current and forthcoming requirements for cryptographic algorithms and techniques T develop shared agenda for research T build constituency S beyond the STORK consortium S consensus building process S prepare the ground for FP6 research actions STORK Partners T Kath. Univ. Leuven (CO), BE T Ecole Normale Supérieure, FR T Ruhr Universität Bochum, DE T Gemplus S.A., FR T Philips Semiconductors GmbH, DE T Vodafone Group Services Ltd, UK T Ericsson AB, SE T France Telecom, FR 4

  5. STORK - Bart Preneel The EU’s Sixth Framew ork Programme T European research from 2003 to 2006 T focus on large-scale, high-impact actions: S Integrated Projects S Networks of Excellence T first calls for proposals mid December 2002, deadline mid April 2003 S http://www.stork.eu.org/fp6.html S http://www.cordis.lu STORK Approach new application constituency open research scenarios issues consensus technologies building, strategies/ consultation, priorities user demands dissemination (privacy vs. ease-of-use) timeline STORK 2003-2006 societal/ethical dimension FP6 legal/regulatory preparation issues 5

  6. STORK - Bart Preneel Key Questions T on which areas should cryptology research concentrate in the next 5-10 years? T which other disciplines are needed for extra expertise? T which are the most important open problems in cryptology? STORK Deliverables T D2 EU Crypto competencies T D4 Status and new trends in cryptology T D5 Roadmap for cryptographic research T D6 List of open problems in cryptology T drafts are available on http://www.stork.eu.org/documents.html T Establish cryptography network 6

  7. STORK - Bart Preneel Goal of this w orkshop T make progress with roadmap and open problems T investigate links with other research areas and applications T build constituency T explore how the cryptographic community should participate to FP6 Get Involved! T contribute to the discussions! T subscribe to our mailing list T contribute to our roadmap development T details at http://www.stork.eu.org T attend 2nd open workshop (organized together with NESSIE): February 26-27, 2003, Lund (S) 7

  8. STORK - Bart Preneel Cryptology and its applications (disclaimer: this diagram does not include all relevant areas) NoE on cryptology? IP in Applications IP on Mobile •e-voting Smart •e-government cards •e-health protocols devi applic algorithms ces ations & modes Crypto models •computational limited •bounded storage •quantum •noisy channels bounded storage crypto quantum crypto Tuesday 26 November 2002 T 9h00-10h00: Introduction [Bart Preneel] T 10h00-10h30: Electronic signatures [Bart Preneel] T 10h30-11h00: coffee break T 11h00-12h00: Quantum Computing and Quantum Cryptography [Mats Näslund] T 12h00-12h15: Smart cards [Peter Roelse] T 12h15-13h45: lunch T 13h45-16h00: Public-Key Cryptography [Jacques Stern] T 16h00-16h30: coffee break T 16h30-17h30: Symmetric Cryptography [Steve Babbage] 8

  9. STORK - Bart Preneel Wednesday 27 November 2002 T 9h00-10h00: Foundations [Louis Granboulan] T 10h00-11h30: Applications and Implementations [Helena Handschuh] T 10h30-11h00: coffee break T 11h30-12h15: Protocols [ Christof Paar] T 12h15-12h30: Concluding remarks T 12h30-14h00: lunch Tuesday, November 26 Dinner 19:30 De Brugse Hanze, Steenstraat 96 Aperitif House Cocktail Assorted Norwegian Smoked Fish Fillet of Beef with Choron Sauce and French Fries Fresh Exotic Fruit Salad with Whipped Cream Coffee and Sweets 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend