ETSI 2nd Quantum-Safe Crypto Workshop in partnership with the IQC

  • 6 - 7 October 2014Add this to my calendar
  • There is no charge for this event
  • Ottawa, Canadaexpand

ETSI, in partnership with the Institute for Quantum Computing (IQC), is pleased to invite you to the second IQC/ETSI Quantum-Safe Crypto Workshop. The event will be held in Ottawa, Canada, on 6th – 7th October, 2014. This workshop will bring together the diverse communities that will need to co-operate to standardize and deploy the next-generation cryptographic infrastructure, in particular, one that will be secure against emerging quantum computing technologies.

Introduction

Goals of this workshop

In early 2013 the IQC and ETSI brought together the conventional cryptography community and the quantum cryptography community with the goal of developing a vision for how these communities could jointly make an effort to create a quantum-safe cryptographic environment. It was the aim of the 1st Quantum-Safe Crypto workshop to understand how these diverse communities could co-operate in order to standardize and deploy the next-generation cryptographic infrastructure, in particular, one that will be secure in a future with quantum computers.
During the 2nd Quantum-Safe Crypto workshop, participants will build on results of the first workshop and develop short and medium term objectives needed to reach the goal of a quantum-safe cryptographic infrastructure. Such objectives could include, for example, a standard for combining a battle-tested conventional key-establishment algorithm with a quantum-safe key establishment protocol, other study items or pre-standards, etc.
In order to achieve these goals, stakeholders are encouraged to start new standardization work within ETSI (either new groups and/or expand the role of some existing groups).
The event is free and is open to all upon registration.

Target Audience

The targeted audience consists of the key players and decision makers in deploying a global quantum-safe cryptographic infrastructure. This includes implementers of conventional post-quantum cryptography (i.e. crypto algorithms resistant against quantum computers), QKD implementers, implementers of cryptography and security tools and systems (which will need quantum-safe cryptographic primitives)), first industry and government adopters of quantum-safe tools, standardization bodies, and anyone else interested in moving now to be a part of creating the quantum-safe cryptographic infrastructure for the future.

Conference Proceedings

ETSI will publish all presentations and associated articles from this workshop, given the agreements of the authors.

Programme Committee

  • Johannes Buchmann, Prof. of Informatics and Mathematics at TU Darmstadt
  • Matthew Campagna
  • Donna Dodson, Deputy Chief Cybersecurity Advisor & Division Chief for Computer Security Division at NIST
  • Nicolas Gisin, University of Geneva
  • Gaby Lenhart, Senior Research Officer at ETSI
  • Michele Mosca, Deputy Director at IQC, University of Waterloo
  • Mark Pecen, Approach Infinity, Inc.
  • Bart Preneel, Past-President of IACR
  • Masahide Sasaki, Director Quantum ICT Laboratory at NICT
  • Andrew Shields, Chairman of ETSI QKD, Toshiba
  • Colin Whorlow, Head of International Standards, CESG

Sponsorship Opportunities

Sponsoring this Workshop is the perfect way to make your company visible in the future networks domain and create a strong association with ETSI. Different packages are available. Contact This email address is being protected from spambots. You need JavaScript enabled to view it. for all details.

 

06 October

  Session 1: Setting the Scene
Chaired by Gaby Lenhart, ETSI
09:00

Welcome Speeches
Luis Jorge Romero, ETSI
Michele Mosca, University of Waterloo 

09:20

Keynote Speech 1
Senior Canadian Gov't representative, TBA

09:40

Keynote Speech 2: Quantum Information Processing
Nicolas Gisin, University of Geneva

10:00

Keynote Speech 3
Bart Preneel, KU Leuven

10:20

Keynote Speech 4
Johannes Buchmann, TU Darmstadt

10:40 Coffee Break
  Session 2: Setting the Scene, continued
Chaired by Bob Crow, IQC
11:00

Keynote Speech 5: Why Quantum technologies do matter for Europe
Stephan Lechner, DG Joint Research Centre

11:20

Keynote Speech 6: R&BD strategy for Quantum Information and Communication
Steven Rim, MSIP

11:40

Keynote Speech 7
Masahide Sasaki, NICT

12:00

Keynote Speech 8
Mark Pecen, Approach Infinity, Inc.

12:30 Lunch Break / Networking Lunch
  Session 3: Deployment
Chaired by Donna Dodson
14:00

Keynote Speech 9: Rethinking the Adoption of Hash Signatures
Burt Kaliski, Verisign

14:20

Neither do people pour new wine into old wineskins
Lily Chen, NIST

14:40

Towards A Standard for Practical Hash-based Signatures
Andreas Hülsing, Technische Universiteit Eindhoven

15:00

PQTor: Integrating quantum-safe cryptography into Tor
William Whyte, Security Innovation

15:20 Q&A - Panel Discussion
15:50 Coffee Break
  Session 4: Standardization and Certification
Chaired by Matthew Campagna
16:20

Traceable characterisation of the optical components of faint-pulse QKD systems – results from the Metrology for Industrial Communications (MIQC) project
Christopher Chunnilall, National Physical Laboratory (UK)

16:40

Multivariate Quadratic Challenge,
Takanori Yasuda, ISIT

17:00

ETSI’s role in the deployment of Quantum Key Distribution
Andrew Shields, Toshiba

17:20 Q&A - Panel Discussion
17:50

End of Day 1
Networking Cocktail

07 October

  Session 5: Industry
Chaired by Nicolas Gisin, University of Geneva
09:00 A Certifiable QKD Relay Node Network
Nino Walenta, Battelle
09:20

Quantum Random Number Generator
Grégoire Ribordy, IDQ

09:40 Efficient Quantum-Immune Keyless Signatures with Identity
Risto Laanoja, Guardtime AS
10:00 Demonstration of quantum cryptography system for keyless authentication of machine-to-machine communications
Dennis Earl, Qubitekk Inc.
10:20 Q&A - Panel Discussion
10:50 Coffee Break
  Session 6: Systems and Attacks
Chaired by Norbert Luetkenhaus
11:20 Testing QKD systems
Vadim Makarov, IQC Waterloo
11:40 Codes for security against computationally unbounded adversaries
Rei Safavi-Naini, University of Calgary
12:00 Q&A - Panel Discussion
12:30 Lunch Break / Networking Lunch
  Session 7: Systems and Attacks, continued
Chaired by Colin Whorlow, CESG
14:00 SOLILOQUY: A Cautionary Tale
Michael Groves, CESG, UK
14:20

The topology of quantum information flow
Jamie Vicary, Oxford University

14:40 An efficient and provably secure authenticated key exchange with forward security from RLWE
Jintai Ding, University of Cincinnati
15:00 Q&A - Panel Discussion
15:30 Coffee Break
  Session 8: Conference Conclusions
Chaired by Michele Mosca, IQC
16:00 Summary of each session by session chair + general event conclusion (Michele Mosca)
17:00 End of Day 2

Biographies

BuchmannJohannes Buchmann, Professor, Department of Computer Science and CASED, Technische Universität Darmstadt, Germany
1982 PhD Mathematics
1985/86 Postdoc Ohio State University, supported by Fellowship of the Alexander von Humboldt Foundation
1988 - 1996 Professor of Computer Science Universität des Saarlandes, Germany
1993 Leibniz Prize Deutsche Forschungsgemeinschaft
1996 - present Professor of Computer Science and Mathematics Technische Universität Darmstadt
2001 - 2007 Vice President Research Technische Universität Darmstadt
2008 - 2011 Director Center of Advanced Security Research Darmstadt CASED.
2011 - present Vice-Director CASED
2011 Member of German Academy of Science Leopoldina

ChenDr. Lily Chen, NIST
Dr. Lily Chen is a mathematician and the acting group manager of cryptographic technology group in Computer Security Division, Information Technology Laboratory, NIST.
Dr. Chen received her Ph.D in applied mathematics from Aarhus University, Denmark. Her research areas include cryptographic protocols, special featured digital signatures, security protocol design, network security, and security for wireless and mobility applications. Besides authoring research papers, Dr. Chen has edited and actively contributed to various industry standards in cryptography and security.

DingJintai Ding, University of Cincinnati
Jintai Ding is a professor at the Department of Mathematical Sciences of the University of Cincinnati. He received his B.A. from Xian Jiaotong University in 1988, his M.A. in mathematics from the University of Science and Technology of China in 1990 and his Ph.D in mathematics from Yale in 1995. He was a lecturer at the Research Institute for Mathematical Sciences of Kyoto University from 1995 to 1998. He has been a faculty member at the University of Cincinnati since 1998. From 2006 to 2007, he was a visiting professor and Alexander Von Humboldt Fellow at Technical University of Darmstadt. From 2009 to 2012, he was a Distinguished Adjunct Professor at South China University of Technology. Since 2011, he has been an adjunct Professor at Chongqing University. He received the Zhong Jia Qing Prize from by the Chinese Mathematical Society in 1990. He was a Taft fellow at Taft Research Center in 2009-2010. His main research interests are in cryptography, computational algebra and information security. He holds patents in cryptographic algorithms in China and USA.

DodsonDonna Dodson, Information Technology Laboratory, NIST
Donna Dodson is also the Division Chief of the Computer Security Division (CSD) and the Acting Executive Director of the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST). Donna oversees the CSD cybersecurity research program to develop standards, guidelines, technology, tests and metrics for the protection of unclassified Federal information and systems. Through partnerships with industry, Dodson also ensures NIST cybersecurity contributions help secure the Nation’s sensitive information and systems. This includes establishing public-private collaborations for accelerating the widespread adoption of integrated cybersecurity tools and technologies. Dodson received one Department of Commerce Gold Medal and three NIST Bronze Medals. She was a recipient of a 2011 Federal 100 Award for her contributions to advancements in cybersecurity and included in the Top 10 Influential People in Government Information Security.

GisinProf. Nicolas Gisin, University of Geneva
Prof. Nicolas Gisin was born in Geneva, Switzerland, in 1952. He received his Ph.D. degree in theoretical physics from the University of Geneva in 1981. After a post-doc at the University of Rochester, NY, and four years in industry, he joined the Group of Applied Physics at the University of Geneva where he has led the optics section since 1988. His activities range from the foundations of quantum physics to applications in quantum communications. In 2009 he was the first awardee of the John Steward Bell prize.

KaliskiDr. Burt Kaliski Jr., Verisign
Dr. Burt Kaliski Jr., senior vice president and chief technology officer, is responsible for developing the company’s long-term technology vision. He is the leader of Verisign Labs, which focuses on applied research, university collaboration, industry thought leadership and intellectual property strategy. He also facilitates the technical community within Verisign.
Prior to joining Verisign in 2011, Kaliski served as the founding director of the EMC Innovation Network, the global collaboration among EMC’s research and advanced technology groups and its university partners. He joined EMC from RSA Security, where he served as vice president of research and chief scientist. Kaliski started his career at RSA in 1989, where as the founding scientist of RSA Laboratories, his contributions included the development of the Public-Key Cryptography Standards (PKCS), now widely deployed in internet security.
Kaliski has held appointments as a guest professor at Wuhan University's College of Computer Science, and as a guest professor and member of the international advisory board of Peking University's School of Software and Microelectronics. He has also taught at Stanford University and Rochester Institute of Technology.
Kaliski is a trustee emeritus of the Massachusetts Technology Leadership Council, and a member of the Institute of Electrical and Electronics Engineers (IEEE) Computer Society and Tau Beta Pi.
Kaliski holds a Bachelor of Science in computer science and engineering, Master of Science in electrical engineering and computer science and doctorate in electrical engineering and computer science from the Massachusetts Institute of Technology, where his research focused on cryptography.

laanojaRisto Laanoja, Guardtime AS
Risto Laanoja is Guardtime's Security Architect. Risto was part of the original engineering team, responsible for building trusted and standard-compliant security procedures and cryptographic schemes. He is a key member of Guardtime's Research & Development directorate.
His field of expertise covers security infrastructure, internet protocols, trust services etc; delivering patents, academic articles, and working prototypes of innovative ideas. Risto's role spans across research, development, integration and operations.

Before joining Guardtime Risto spent 10 years at SEB in data security management and infrastructure development positions. Back then, he was responsible for security and pioneering online-banking and national digital signature infrastructure applications.

He has graduate and undergraduate level teaching experience.
Risto is pursuing his PhD degree at Tallinn University of Technology, working on provable security of KSI and its applications.

LechnerDr Stephan Lechner
Dr Lechner is the Director of the Institute for the Protection and the Security of the Citizen (IPSC) at the European Commission's Joint Research Centre (JRC). The IPSC is located in Ispra, Italy and employs over 300 researchers on technical and scientific security aspects of various sectors (buildings, networks, financial systems, society) crisis management, maritime security and new Information Technology. Dr Lechner's background is in mathematics and computer sciences and he holds a PhD in cryptography.

Before joining the European Commission, Dr Lechner used to be Global Department Head for Security Research at Siemens Corporate Research from 2002 to 2007. He worked as head of Corporate Security and as IT Security in the telecommunications sector in Germany from 1993 to 2002 and started his professional career as network security researcher at Siemens in 1989.

Dr Lechner was member of the European Security Research advisory Board (ESRAB) and Member of the Permanent Stakeholders' Group of the European Network and Information Security Agency ENISA. He was also chairman of the Secure IST Advisory Board for the respective co-ordination action in Framework Programme 6.

He used to work in European Standardisation in ETSI and ECMA and holds an active CISSP (Certified Information Systems Security Professional) qualification.

moscaMichele MOSCA, Institute for Quantum Computing at the University of Waterloo
Michele Mosca (DPhil, Oxford) is co-founder and Deputy Director of the Institute for Quantum Computing at the University of Waterloo, and a founding member of the Perimeter Institute for Theoretical Physics. He is co-founder and director of the NSERC CREATE Training Program in Building a Workforce for the Cryptographic Infrastructure of the 21st Century (CryptoWorks21.com). His current research interests include quantum algorithms and complexity, and the development of cryptographic tools that will be safe against quantum technologies. Awards and honours include the 2010 Canada’s Top 40 Under 40 award, Canada Research Chair in Quantum Computation (2002-2012), Fellow of the Canadian Institute for Advanced Research (2010-present), University Research Chair (2012-present), and Queen Elizabeth II Diamond Jubilee Medal (2013).

PecenMark Pecen, CEO, Approach Infinity, Inc.
Mark Pecen serves as CEO of Approach Infinity, Inc., providing advisory services to firms requiring technology due diligence and management consulting in the areas of wireless communication and emerging technologies, rapidly growing technology companies and their venture capital funding partners. The firm comprises a network of senior executives and experts in the management of technology, innovation, research and development, marketing, sales, global standards, patents, technology entrepreneurship, and individuals with specific technical disciplines such as information theory, radio frequency systems, wireless system protocols, cryptography and others.
Pecen retired as Sr. Vice President, Research and Advanced Technology and technology advisor to the CEO of BlackBerry, maker of wireless smart phones. He was responsible for the creation and management of BlackBerry’s Advanced Technology Research Centre and a significant portion of BlackBerry’s wireless patent portfolio. A past Distinguished Innovator and member of the Science Advisory Board at Motorola, Pecen also managed consultation work for clients in North America and Europe.
Pecen invented a number of technologies that have later been adopted in global standards, including the Global System for Mobile Telecommunication (GSM), Universal Mobile Telecommunication System (UMTS), High-Speed Packet Access (HSPA+), Long-Term Evolution (LTE) for 4G wireless and others.
Pecen serves as an advisor to several industry and academic organizations, and is a regular advisor to the Canadian government on wireless communication and research. He holds board positions on University of Waterloo Institute for Quantum Computing, École Polytechnique, Wilfred Laurier University School of Business, Quantum Works academic network for quantum information research, Canadian Digital Media Network, the Communication Research Centre (CRC) of Industry Canada and others.
A veteran of the wireless industry, he is an author and editor of a number of text books in the area of wireless technology and holds more than 100 fundamental patents in areas of wireless communication, networking and computing, and is a graduate of the University of Pennsylvania, Wharton School of Business and the School of Engineering and Applied Sciences.

preneelProf. Bart Preneel, Past-President of IACR
Prof. Bart Preneel is a full professor at the KU Leuven; he heads the COSIC research group, that is a member of the iMinds Security Department. He was visiting professor at five universities in Europe. He has authored more than 400 scientific publications and is inventor of 4 patents. His main research interests are cryptography, information security and privacy. Bart Preneel has coordinated the Network of Excellence ECRYPT, has served as panel member and chair for the European Research Council and has been president of the IACR (International Association for Cryptologic Research). He is a member of the Permanent Stakeholders group of ENISA (European Network and Information Security Agency) and of the Academia Europaea. He has been invited speaker at more than 90 conferences in 40 countries. In 2014 he received the RSA Award for Excellence in the Field of Mathematics.

rim

Steven Yongjae Rim, Creative Planner, Network Ministry of Science, ICT and Future Planning
Career history:
Oct 2013 - current MSIP Creative Planner
Nov 2010 - Sep 2013 KCC Project Manager
Aug 2010 - Oct 2010 Cisco Systems, Inc. Global Alliance/GM
Feb 2002 - Oct 2002 Myungji University Professor, Electronics Eng.
Sep 2004 - Dec 2008 Samsung Electronics VP, TN Division, Strategic Marketing
Jun 2000 - Feb 1998 Cisco Systems, Inc. Technical Lead for CRS-1, CAT6K
Sep 1996 - Feb 1998 Motorola System Architect, MP System
Jan 1990 - Sep 1996 IBM Advisory Engineer, High-End CPU Design

Academic Career:
Sep 1986 - Dec 1989 Ph.D. Univ. of Texas at Austin, EE
Jan 1983 - May 1986 MS, Univ. of Texas at Austin, EE
Mar 1978 - Feb 1982 BS, Electronics, Yonsei University

Safavi-NainiRei Safavi-Naini, University of Calgary
Rei Safavi-Naini is the AITF Strategic Chair in Information Security and a Professor in the Department of Compute at the University of Calgary. Her research interests includes cryptography, information theoretic security and protocols and systems for providing security and privacy.
http://pages.cpsc.ucalgary.ca/~rei/

sasaki

Dr. Masahide Sasaki, Director Quantum ICT Laboratory at NICT
Masahide Sasaki received the B.S., M.S., and Ph.D. degrees in physics from Tohoku University, Sendai Japan, in 1986, 1988 and 1992, respectively. From 1992 to 1996, he worked on the development of Si devices in Nippon Kokan Company (presently JFE holdings), Kanagawa Japan. In 1996, He joined the Communications Research Laboratory, Ministry of Posts and Telecommunications (since 2004, National Institute of Information and Communications Technology, Ministry of Internal Affairs and Communications), Tokyo, Japan, working on quantum information and communications technology. He has published more than 200 papers in refereed journals, edited two books, and written three book chapters.
Dr. Sasaki is currently a Director of Quantum ICT Laboratory, and serves as the Chair of Quantum ICT Forum, conducting the Project UQCC (Updating Quantum Cryptography and Communications). He is a member of Japanese Society of Physics, and the Institute of Electronics, Information and Communication Engineers of Japan.

WalentaNino Walenta, Battelle Memorial Institute, Columbus, Ohio, USA
Nino Walenta received the Diploma degree in physics from the University of Potsdam, Germany, and the Ph.D. degree in physics from the University of Geneva, Switzerland, in 2013.
From 2007 to 2008, he was a research assistant at the University of Potsdam, and in 2013, he was a Postdoctoral researcher at the University of Geneva. He joined Battelle UK Ltd., Geneva, Switzerland in December 2013. At present, he is a Principle Research Scientist at Battelle Memorial Institute, Columbus, Ohio, USA. His research has been concerned with quantum optics and quantum communication, with focus on single photon detection and implementations for fiber based quantum key distribution devices.
Dr. Nino Walenta is member of the German Physical Society (DPG).

WhorlowColin Whorlow, Head of International Standards, CESG
Colin Whorlow has worked in CESG, the UK National Technical Authority for Information Assurance, for 15 years. Now Head of International Standards he was formerly Head of International Relations where he led CESG's engagement on EU and NATO information assurance issues. Colin is a member of the Management Board of ENISA (European Network and Information Security Agency) and of the SOG-IS Management Committee. He has led workshops on the impact of Cybersecurity on Critical Information Infrastructure Protection as part of the Meridian Process and at the Budapest Conference on Cyberspace. Previously Head of Export Control Colin chaired the Information Security Technical Working Group at the Wassenaar Arrangement for some years. Colin's degree is in mathematics, which he read at Oxford University.