36C3 - (Post-Quantum) Isogeny Cryptography

  Рет қаралды 5,498

media.ccc.de

media.ccc.de

Күн бұрын

media.ccc.de/v/36c3-10543-pos...
There are countless post-quantum buzzwords to list: lattices, codes, multivariate polynomial systems, supersingular elliptic curve isogenies. We cannot possibly explain in one hour what each of those mean, but we will do our best to give the audience an idea about why elliptic curves and isogenies are awesome for building strong cryptosystems.
It is the year 2019 and apparently quantum supremacy is finally upon us [1,2]. Surely, classical cryptography is broken? How are we going to protect our personal communication from eagerly snooping governments now? And more importantly, who will make sure my online banking stays secure?
The obvious sarcasm aside, we should strive for secure post-quantum cryptography in case push comes to shove. Post-quantum cryptography is currently divided into several factions. On the one side there are the lattice- and code-based system loyalists. Other groups hope that multivariate polynomials will be the answer to all of our prayers. And finally, somewhere over there we have elliptic curve isogeny cryptography.
Unfortunately, these fancy terms "supersingular", "elliptic curve", "isogeny" are bound to sound magical to the untrained ear. Our goal is to shed some light on this proposed type of post-quantum cryptography and bring basic understanding of these mythical isogenies to the masses. We will explain how elliptic curve isogenies work and how to build secure key exchange and signature algorithms from them. We aim for our explanations to be understandable by a broad audience without previous knowledge of the subject.
[1] www.quantamagazine.org/john-p...
[2] www.nature.com/articles/d4158...
naehrwert
fahrplan.events.ccc.de/congre...

Пікірлер
Elliptic Curves - Computerphile
8:42
Computerphile
Рет қаралды 539 М.
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01
Wait for the last one! 👀
00:28
Josh Horton
Рет қаралды 127 МЛН
터키아이스크림🇹🇷🍦Turkish ice cream #funny #shorts
00:26
Byungari 병아리언니
Рет қаралды 28 МЛН
The child was abused by the clown#Short #Officer Rabbit #angel
00:55
兔子警官
Рет қаралды 22 МЛН
36C3 -  Open Source is Insufficient to Solve Trust Problems in Hardware
1:00:46
The Most Important Algorithm in Machine Learning
40:08
Artem Kirsanov
Рет қаралды 301 М.
36C3 -  A systematic evaluation of OpenBSD's mitigations
53:02
media.ccc.de
Рет қаралды 14 М.
36C3 -  SELECT code_execution FROM * USING SQLite;
46:47
media.ccc.de
Рет қаралды 7 М.
7. Value At Risk (VAR) Models
1:21:15
MIT OpenCourseWare
Рет қаралды 505 М.
36C3 -  Boeing 737MAX: Automated Crashes
1:00:48
media.ccc.de
Рет қаралды 172 М.
36C3 -  How to Break PDFs
58:43
media.ccc.de
Рет қаралды 33 М.
36C3 -  An ultrashort history of ultrafast imaging
1:00:13
media.ccc.de
Рет қаралды 4 М.
Hot Topics in Computing Prof. Michael Bronstein
1:08:04
Symposia at CSAIL
Рет қаралды 2,7 М.
36C3 -  SIM card technology from A-Z
1:03:23
media.ccc.de
Рет қаралды 19 М.
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01