SLIDE 1
STORK - Strategic Roadmap for (K)Crypto A roadmap project in the - - PDF document
STORK - Strategic Roadmap for (K)Crypto A roadmap project in the - - PDF document
STORK - Bart Preneel STORK - Strategic Roadmap for (K)Crypto A roadmap project in the European Commissions IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org Agenda of introductory session T Introduction to STORK T The 6th
SLIDE 2
SLIDE 3
STORK - Bart Preneel 3
Cryptology research (2)
T cryptographic protocols
S complex settings & requirements: voting, privacy, auction,
digital rights management
S plug-and-play S entity authentication for extreme environments S dependability /survivability of heterog. wide-area systems S methodologies: reductions, formal methods
T unconditionally secure cryptology
S quantum models S noisy channels S public randomness
New environments
T low cost secure bus encryption T ambient intelligence T inexpensive transactions T smart cards T complex interactions T cryptography in a world where large
quantum computers exist
SLIDE 4
STORK - Bart Preneel 4
STORK: Objectives
T identify gaps between state of the art in
cryptology research and current and forthcoming requirements for cryptographic algorithms and techniques
T develop shared agenda for research T build constituency
S beyond the STORK consortium S consensus building process S prepare the ground for FP6 research actions
STORK Partners
T Kath. Univ. Leuven (CO), BE T Ecole Normale Supérieure, FR T Ruhr Universität Bochum, DE T Gemplus S.A., FR T Philips Semiconductors GmbH, DE T Vodafone Group Services Ltd, UK T Ericsson AB, SE T France Telecom, FR
SLIDE 5
STORK - Bart Preneel 5
The EU’s Sixth Framew ork Programme
T European research from 2003 to 2006 T focus on large-scale, high-impact actions:
S Integrated Projects S Networks of Excellence
T first calls for proposals mid December
2002, deadline mid April 2003
S http://www.stork.eu.org/fp6.html S http://www.cordis.lu
STORK Approach
user demands (privacy vs. ease-of-use)
- pen research
issues
STORK constituency
consensus building, consultation, dissemination
strategies/ priorities timeline 2003-2006 FP6 preparation new application scenarios technologies societal/ethical dimension legal/regulatory issues
SLIDE 6
STORK - Bart Preneel 6
Key Questions
T on which areas should cryptology research
concentrate in the next 5-10 years?
T which other disciplines are needed for extra
expertise?
T which are the most important open problems in
cryptology?
STORK Deliverables
T D2 EU Crypto competencies T D4 Status and new trends in cryptology T D5 Roadmap for cryptographic research T D6 List of open problems in cryptology T drafts are available on
http://www.stork.eu.org/documents.html
T Establish cryptography network
SLIDE 7
STORK - Bart Preneel 7
Goal of this w orkshop
T make progress with roadmap and open
problems
T investigate links with other research areas
and applications
T build constituency T explore how the cryptographic community
should participate to FP6
Get Involved!
T contribute to the discussions! T subscribe to our mailing list T contribute to our roadmap development T details at http://www.stork.eu.org T attend 2nd open workshop (organized
together with NESSIE): February 26-27, 2003, Lund (S)
SLIDE 8
STORK - Bart Preneel 8
Cryptology and its applications
(disclaimer: this diagram does not include all relevant areas)
Crypto models
- computational limited
- bounded storage
- quantum
- noisy channels
devi ces algorithms & modes protocols applic ations
IP on Smart cards IP in Mobile quantum crypto NoE on cryptology? bounded storage crypto Applications
- e-voting
- e-government
- e-health
Tuesday 26 November 2002
T 9h00-10h00: Introduction [Bart Preneel] T 10h00-10h30: Electronic signatures [Bart Preneel] T 10h30-11h00: coffee break T 11h00-12h00: Quantum Computing and Quantum
Cryptography [Mats Näslund]
T 12h00-12h15: Smart cards [Peter Roelse] T 12h15-13h45: lunch T 13h45-16h00: Public-Key Cryptography [Jacques Stern] T 16h00-16h30: coffee break T 16h30-17h30: Symmetric Cryptography [Steve Babbage]
SLIDE 9