STORK - Strategic Roadmap for (K)Crypto A roadmap project in the - - PDF document

stork strategic roadmap for k crypto
SMART_READER_LITE
LIVE PREVIEW

STORK - Strategic Roadmap for (K)Crypto A roadmap project in the - - PDF document

STORK - Bart Preneel STORK - Strategic Roadmap for (K)Crypto A roadmap project in the European Commissions IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org Agenda of introductory session T Introduction to STORK T The 6th


slide-1
SLIDE 1

STORK - Bart Preneel 1

STORK - Strategic Roadmap for (K)Crypto

A roadmap project in the European Commission’s IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org

Agenda of introductory session

T Introduction to STORK T The 6th Framework Programme

(Aniyan Varghese)

T NESSIE: Overview

slide-2
SLIDE 2

STORK - Bart Preneel 2

The Need for FP6 Research Actions in Cryptology

T privacy and security are critical success

factors for the lift-off of novel applications and technologies

T cryptology is a key building block T help Europe stay ahead T avoid fragmentation, proprietary

solutions, technology lock-in situations

T consistent approach, standardization

Cryptology research (1)

T area is strategic/interdisciplinary/scattered/complex T cryptographic algorithms

S ad hoc and provable security S lightweight/low cost algorithms (e.g. stream ciphers) S new “from scratch” algorithms (e.g. one-way functions) S pseudo-random bit generators S public-key algorithms not based on factoring and discrete

logarithm

S design and validation (including building blocks)

slide-3
SLIDE 3

STORK - Bart Preneel 3

Cryptology research (2)

T cryptographic protocols

S complex settings & requirements: voting, privacy, auction,

digital rights management

S plug-and-play S entity authentication for extreme environments S dependability /survivability of heterog. wide-area systems S methodologies: reductions, formal methods

T unconditionally secure cryptology

S quantum models S noisy channels S public randomness

New environments

T low cost secure bus encryption T ambient intelligence T inexpensive transactions T smart cards T complex interactions T cryptography in a world where large

quantum computers exist

slide-4
SLIDE 4

STORK - Bart Preneel 4

STORK: Objectives

T identify gaps between state of the art in

cryptology research and current and forthcoming requirements for cryptographic algorithms and techniques

T develop shared agenda for research T build constituency

S beyond the STORK consortium S consensus building process S prepare the ground for FP6 research actions

STORK Partners

T Kath. Univ. Leuven (CO), BE T Ecole Normale Supérieure, FR T Ruhr Universität Bochum, DE T Gemplus S.A., FR T Philips Semiconductors GmbH, DE T Vodafone Group Services Ltd, UK T Ericsson AB, SE T France Telecom, FR

slide-5
SLIDE 5

STORK - Bart Preneel 5

The EU’s Sixth Framew ork Programme

T European research from 2003 to 2006 T focus on large-scale, high-impact actions:

S Integrated Projects S Networks of Excellence

T first calls for proposals mid December

2002, deadline mid April 2003

S http://www.stork.eu.org/fp6.html S http://www.cordis.lu

STORK Approach

user demands (privacy vs. ease-of-use)

  • pen research

issues

STORK constituency

consensus building, consultation, dissemination

strategies/ priorities timeline 2003-2006 FP6 preparation new application scenarios technologies societal/ethical dimension legal/regulatory issues

slide-6
SLIDE 6

STORK - Bart Preneel 6

Key Questions

T on which areas should cryptology research

concentrate in the next 5-10 years?

T which other disciplines are needed for extra

expertise?

T which are the most important open problems in

cryptology?

STORK Deliverables

T D2 EU Crypto competencies T D4 Status and new trends in cryptology T D5 Roadmap for cryptographic research T D6 List of open problems in cryptology T drafts are available on

http://www.stork.eu.org/documents.html

T Establish cryptography network

slide-7
SLIDE 7

STORK - Bart Preneel 7

Goal of this w orkshop

T make progress with roadmap and open

problems

T investigate links with other research areas

and applications

T build constituency T explore how the cryptographic community

should participate to FP6

Get Involved!

T contribute to the discussions! T subscribe to our mailing list T contribute to our roadmap development T details at http://www.stork.eu.org T attend 2nd open workshop (organized

together with NESSIE): February 26-27, 2003, Lund (S)

slide-8
SLIDE 8

STORK - Bart Preneel 8

Cryptology and its applications

(disclaimer: this diagram does not include all relevant areas)

Crypto models

  • computational limited
  • bounded storage
  • quantum
  • noisy channels

devi ces algorithms & modes protocols applic ations

IP on Smart cards IP in Mobile quantum crypto NoE on cryptology? bounded storage crypto Applications

  • e-voting
  • e-government
  • e-health

Tuesday 26 November 2002

T 9h00-10h00: Introduction [Bart Preneel] T 10h00-10h30: Electronic signatures [Bart Preneel] T 10h30-11h00: coffee break T 11h00-12h00: Quantum Computing and Quantum

Cryptography [Mats Näslund]

T 12h00-12h15: Smart cards [Peter Roelse] T 12h15-13h45: lunch T 13h45-16h00: Public-Key Cryptography [Jacques Stern] T 16h00-16h30: coffee break T 16h30-17h30: Symmetric Cryptography [Steve Babbage]

slide-9
SLIDE 9

STORK - Bart Preneel 9

Wednesday 27 November 2002

T 9h00-10h00: Foundations [Louis Granboulan] T 10h00-11h30: Applications and Implementations

[Helena Handschuh]

T 10h30-11h00: coffee break T 11h30-12h15: Protocols [ Christof Paar] T 12h15-12h30: Concluding remarks T 12h30-14h00: lunch

Tuesday, November 26 Dinner

Aperitif House Cocktail Assorted Norwegian Smoked Fish Fillet of Beef with Choron Sauce and French Fries Fresh Exotic Fruit Salad with Whipped Cream Coffee and Sweets

19:30 De Brugse Hanze, Steenstraat 96