cryptography and quantum computers: where do we stand? · 2020. 1. 29. · why does eve need a...

47
Cryptography and quantum computers: Where do we stand? Chloe Martindale University of Bristol CS Seminar, Bristol, 29 January 2020

Upload: others

Post on 16-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Cryptography and quantum computers:Where do we stand?

Chloe Martindale

University of Bristol

CS Seminar, Bristol, 29 January 2020

Page 2: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

What is this all about?

1 / 17

Page 3: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Cryptography

Sender Channel with eavesdropper ‘Eve’ Receiver

Problems:I Communication channels store and spy on our dataI Communication channels are modifying our data

Goals:I Confidentiality despite Eve’s espionage.I Integrity: recognising Eve’s espionage.

(Slide mostly stolen from Tanja Lange)

2 / 17

Page 4: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Cryptography

Sender Channel with eavesdropper ‘Eve’ Receiver

Problems:I Communication channels store and spy on our dataI Communication channels are modifying our data

Goals:I Confidentiality despite Eve’s espionage.I Integrity: recognising Eve’s espionage.

(Slide mostly stolen from Tanja Lange)

2 / 17

Page 5: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Cryptography

Sender Channel with eavesdropper ‘Eve’ Receiver

Problems:I Communication channels store and spy on our dataI Communication channels are modifying our data

Goals:I Confidentiality despite Eve’s espionage.I Integrity: recognising Eve’s espionage.

(Slide mostly stolen from Tanja Lange)2 / 17

Page 6: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Post-quantum cryptography

Sender Channel with eavesdropper ‘Eve’ Receiver

I Eve has a quantum computer.I Harry and Meghan don’t have a quantum computer.

(Slide mostly stolen from Tanja Lange)

3 / 17

Page 7: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Post-quantum cryptography

Sender Channel with eavesdropper ‘Eve’ Receiver

I Eve has a quantum computer.I Harry and Meghan don’t have a quantum computer.

(Slide mostly stolen from Tanja Lange)

3 / 17

Page 8: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true. will make current asymmetric algorithms obselete.

I Symmetric cryptography typically has less mathematicalstructure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks. reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 9: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true.

will make current asymmetric algorithms obselete.I Symmetric cryptography typically has less mathematical

structure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks. reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 10: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true. will make current asymmetric algorithms obselete.

I Symmetric cryptography typically has less mathematicalstructure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks. reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 11: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true. will make current asymmetric algorithms obselete.

I Symmetric cryptography typically has less mathematicalstructure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks.

reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 12: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true. will make current asymmetric algorithms obselete.

I Symmetric cryptography typically has less mathematicalstructure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks. reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 13: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Why does Eve need a quantum computer?

I In practise, crypto relies on a mix of asymmetric andsymmetric cryptography.

I Asymmetric cryptography typically relies on the ‘discretelogarithm problem’ being slow to solve:with Shor’s quantum algorithm this is no longer true. will make current asymmetric algorithms obselete.

I Symmetric cryptography typically has less mathematicalstructure so quantum computers are less devastating,but Grover’s quantum algorithm still speeds up attacks. reduces security of current symmetric algorithms.

Main goal: replace the use of the discrete logarithm problem inasymmetric cryptography with something quantum-resistant.

4 / 17

Page 14: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Diffie–Hellman key exchange ’76

Public parameters:I a prime p (experts: uses F∗

p , today also elliptic curves)

I a number n (mod p) (nonexperts: think of an integer less than p)

Harry Eve Meghan

a random←−−− {0...p−1} b random←−−− {0...p−1}

na nb

s := (nb)a s := (na)b

I Harry and Meghan agree on a secret key s, then they canuse that to encrypt their messages.

I Eve sees na and nb, but can’t find a, b, or s.

Broken by Shor!

5 / 17

Page 15: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Diffie–Hellman key exchange ’76

Public parameters:I a prime p (experts: uses F∗

p , today also elliptic curves)

I a number n (mod p) (nonexperts: think of an integer less than p)

Harry Eve Meghan

a random←−−− {0...p−1} b random←−−− {0...p−1}

na nb

s := (nb)a s := (na)b

I Harry and Meghan agree on a secret key s, then they canuse that to encrypt their messages.

I Eve sees na and nb, but can’t find a, b, or s.

Broken by Shor!

5 / 17

Page 16: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Diffie–Hellman key exchange ’76

Public parameters:I a prime p (experts: uses F∗

p , today also elliptic curves)

I a number n (mod p) (nonexperts: think of an integer less than p)

Harry Eve Meghan

a random←−−− {0...p−1} b random←−−− {0...p−1}

na nb

s := (nb)a s := (na)b

I Harry and Meghan agree on a secret key s, then they canuse that to encrypt their messages.

I Eve sees na and nb, but can’t find a, b, or s.

Broken by Shor!

5 / 17

Page 17: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Diffie–Hellman key exchange ’76

Public parameters:I a prime p (experts: uses F∗

p , today also elliptic curves)

I a number n (mod p) (nonexperts: think of an integer less than p)

Harry Eve Meghan

a random←−−− {0...p−1} b random←−−− {0...p−1}

na nb

s := (nb)a s := (na)b

I Harry and Meghan agree on a secret key s, then they canuse that to encrypt their messages.

I Eve sees na and nb, but can’t find a, b, or s.

Broken by Shor!

5 / 17

Page 18: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Diffie–Hellman key exchange ’76

Public parameters:I a prime p (experts: uses F∗

p , today also elliptic curves)

I a number n (mod p) (nonexperts: think of an integer less than p)

Harry Eve Meghan

a random←−−− {0...p−1} b random←−−− {0...p−1}

na nb

s := (nb)a s := (na)b

I Harry and Meghan agree on a secret key s, then they canuse that to encrypt their messages.

I Eve sees na and nb, but can’t find a, b, or s.

Broken by Shor!

5 / 17

Page 19: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 20: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 21: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 22: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 23: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 24: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

AlternativesIdeas to replace the discrete logarithm problem:

I Code-based encryption: uses error correcting codes.Short ciphertexts, large public keys.

I Hash-based signatures: uses hard-to-invert functions.Well-studied security, small public keys.

I Isogeny-based encryption and signatures: based onfinding maps between (elliptic) curves.Smallest keys, slow encryption.

I Lattice-based encryption and signatures: based on findingshort vectors in high-dimensional lattices.Fastest encryption, huge keys, slow signatures.

I Multivariate signatures: based on solving simulateneousmultivariate equations.Short signatures, large public keys, slow.

(Slide mostly stolen from Tanja Lange)

6 / 17

Page 25: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Graph walking Diffie-Hellman?

Problem:It is trivial to find paths (subtract coordinates).

What to do?

7 / 17

Page 26: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Graph walking Diffie-Hellman?

Problem:It is trivial to find paths (subtract coordinates).

What to do?

7 / 17

Page 27: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Graph walking Diffie-Hellman?

Problem:It is trivial to find paths (subtract coordinates).

What to do?

7 / 17

Page 28: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Graph walking Diffie-Hellman?

Problem:It is trivial to find paths (subtract coordinates).

What to do?

7 / 17

Page 29: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Big picture

I Isogenies are a source of exponentially-sized graphs.

I We can walk efficiently on these graphs.

I Fast mixing: short paths to (almost) all nodes.

I No known efficient algorithms to recover pathsfrom endpoints.

I Enough structure to navigate the graph meaningfully.That is: some well-behaved ‘directions’ to describe paths.

8 / 17

Page 30: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Big picture

I Isogenies are a source of exponentially-sized graphs.

I We can walk efficiently on these graphs.

I Fast mixing: short paths to (almost) all nodes.

I No known efficient algorithms to recover pathsfrom endpoints.

I Enough structure to navigate the graph meaningfully.That is: some well-behaved ‘directions’ to describe paths.

8 / 17

Page 31: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Big picture

I Isogenies are a source of exponentially-sized graphs.

I We can walk efficiently on these graphs.

I Fast mixing: short paths to (almost) all nodes.

I No known efficient algorithms to recover pathsfrom endpoints.

I Enough structure to navigate the graph meaningfully.That is: some well-behaved ‘directions’ to describe paths.

8 / 17

Page 32: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Big picture

I Isogenies are a source of exponentially-sized graphs.

I We can walk efficiently on these graphs.

I Fast mixing: short paths to (almost) all nodes.

I No known efficient algorithms to recover pathsfrom endpoints.

I Enough structure to navigate the graph meaningfully.That is: some well-behaved ‘directions’ to describe paths.

8 / 17

Page 33: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Big picture

I Isogenies are a source of exponentially-sized graphs.

I We can walk efficiently on these graphs.

I Fast mixing: short paths to (almost) all nodes.

I No known efficient algorithms to recover pathsfrom endpoints.

I Enough structure to navigate the graph meaningfully.That is: some well-behaved ‘directions’ to describe paths.

8 / 17

Page 34: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies

Components of the isogeny graphs look like this:

9 / 17

Page 35: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies

Components of the isogeny graphs look like this:

9 / 17

Page 36: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies

Components of the isogeny graphs look like this:

9 / 17

Page 37: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies

At this time, there are two distinct families of systems:

CSIDH ["si:­saId]https://csidh.isogeny.org

SIKEhttps://sike.org

9 / 17

Page 38: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies

10 / 17

Page 39: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Case study: Isogenies. Key exchange at the CSIDH

11 / 17

Page 40: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Where are we now?

I Post-quantum cryptography discussion dominated byNIST competition for standardization.

I This initiative comes after a US report with:

Key Finding 10: Even if a quantum computer that can decryptcurrent cryptographic ciphers is more than a decade off, thehazard of such a machine is high enough—and the time framefor transitioning to a new security protocol is sufficiently longand uncertain—that prioritization of the development, stan-dardization, and deployment of post-quantum cryptographyis critical for minimizing the chance of a potential security andprivacy disaster.

12 / 17

Page 41: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Where are we now?

I Post-quantum cryptography discussion dominated byNIST competition for standardization.

I This initiative comes after a US report with:

Key Finding 10: Even if a quantum computer that can decryptcurrent cryptographic ciphers is more than a decade off, thehazard of such a machine is high enough—and the time framefor transitioning to a new security protocol is sufficiently longand uncertain—that prioritization of the development, stan-dardization, and deployment of post-quantum cryptographyis critical for minimizing the chance of a potential security andprivacy disaster.

12 / 17

Page 42: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Where are we now (according to NIST)?

The NIST not-a-competition:

I Had 82 submissions in 2017I 69 were acceptedI 26 submissions currently in 2nd round, aiming for a total

of 3 roundsI Aiming for standardization in 2022.

13 / 17

Page 43: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Where are we now (according to NIST)?

Stolen from NIST’s/Dustin Moody’s Round 1 summary from2019:

Signatures EncryptionCode-based 2 17Hased-based 3 0Isogeny-based 1 1Lattice-based 5 21Multivariate 7 2Others 2 4

I Doesn’t include CSIDH!(It is newer than the NIST competition).

14 / 17

Page 44: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Where are we now (according to NIST)?

Stolen from NIST’s/Dustin Moody’s Round 1 summary from2019:

Signatures EncryptionCode-based 2 17Hased-based 3 0Isogeny-based 1 1Lattice-based 5 21Multivariate 7 2Others 2 4

I Doesn’t include CSIDH!(It is newer than the NIST competition).

14 / 17

Page 45: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

What can we do?

We have:I KEM/Encryption and signatures

(many options from NIST competition).

I Diffie-Hellman-style / non-interactive key exchange(only option is with CSIDH).

We don’t have:I Anything else! For example, privacy-preserving protocols.

15 / 17

Page 46: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Important open problems/research directions

Needed for all post-quantum candidates:

I Thorough cryptanalysis – classical and quantum.I Secure and efficient implementation (especially

considering hardware limitations).I Meaningful comparison between candidates (must come

from comparable implementations).I More advanced protocols.

16 / 17

Page 47: Cryptography and quantum computers: Where do we stand? · 2020. 1. 29. · Why does Eve need a quantum computer? I In practise, crypto relies on a mix ofasymmetricand symmetriccryptography

Thank you!

17 / 17