The National Institute of Standards and Technology (NIST) has been evaluating Post-Quantum Cryptography proposals since 2017. Lattice-based schemes have emerged as efficient candidates for Key Encapsulation Mechanisms (KEM) and Digital Signatures. This talk will cover the core operations within lattice-based schemes and efficient implementation strategies. Why it matters: As quantum computing advances, exploring and standardizing post-quantum cryptography is crucial for maintaining secure communication and data protection in the future.
A cryptanalysis team at the UAE's Cryptography Research Center (CRC) has set new records in computation by decrypting a McEliece ciphertext without the secret key at INRIA’s McEliece decoding challenge, taking first and second place. The record computation took about 31.4 days on a cluster using 256 CPU-cores. The team also achieved top ranks in decoding quasi-cyclic codes and ternary codes, used in post-quantum cryptography. Why it matters: This achievement demonstrates the UAE's growing capabilities in advanced cryptography research and its contributions to the global effort to develop quantum-resistant algorithms.
CINVESTAV-IPN's Computer Science Department hosted a seminar by Prof. Francisco Rodriguez-Henriquez on isogeny-based key exchange protocols. The talk reviewed Supersingular Isogeny-based Diffie-Hellman (SIDH) and Commutative Supersingular Isogeny-based Diffie-Hellman (CSIDH). Isogeny-based protocols offer short key sizes but have higher latency compared to other post-quantum cryptosystems. Why it matters: This seminar contributes to the exploration of post-quantum cryptography, an important area for ensuring data security against future quantum computing threats.
TII researchers contributed to the advancement of six digital signature schemes to Round 2 of the NIST Post-Quantum Cryptography (PQC) Standardization process. These schemes were selected from an initial pool of 40 candidates. TII researchers have contributed updates to these schemes, focusing on design refinements that reduced signature sizes while maintaining security. Why it matters: This contribution highlights the UAE's growing role in cutting-edge research areas like post-quantum cryptography, which is crucial for future digital security.
Dr. Najwa Aaraj from MBZUAI and TII discussed the impact of quantum computers and machine learning on cryptographic algorithms. The talk covered post-quantum cryptographic (PQC) schemes, standardization efforts, and the role of machine learning in advancing cybersecurity solutions. Dr. Aaraj also highlighted the challenges of transitioning current cryptographic systems to quantum-resistant alternatives. Why it matters: As quantum computing advances, understanding and implementing post-quantum cryptography is crucial for maintaining secure communications and data protection in the UAE and globally.
Professor Mike Scott will present a seminar at the Technology Innovation Institute's Cryptography Research Centre in the UAE. The seminar will focus on the challenges of keeping secrets safe from attackers in the context of cryptography. It will review proposed solutions, discuss use cases, and present a promising new approach. Why it matters: This seminar indicates TII's ongoing research and development efforts in advanced cryptography, a crucial area for secure digital infrastructure in the UAE and beyond.
Communications Physics journal has a focus collection on space quantum communications. The collection covers supporting technologies, new quantum protocols, inter-satellite QKD, constellations of satellites, and quantum inspired technologies and protocols for space based communication. Contributions are welcome from October 20, 2020 to April 30, 2021, and accepted papers are published on a rolling basis. Why it matters: Space-based quantum communication is a critical area for developing secure, global quantum networks, and this collection could highlight relevant research for the GCC region as it invests in advanced technologies.
Prof. Daniel Panario gave a seminar on irreducible polynomials over finite fields and their applications in cryptography. The seminar covered how finite fields are used as basic components in many cryptographic applications. It surveyed families of irreducible polynomials and commented on their properties. Why it matters: The talk highlights the mathematical foundations and ongoing research relevant to cryptographic implementations in the region.