Understanding Post-Quantum Cryptography & Secure Key Exchange 🌐 by Jintai Ding

Explore the latest advancements in post-quantum cryptography and key exchange protocols based on LWE and RLWE problems, presented by renowned expert Jintai Ding from Tsinghua University.

Understanding Post-Quantum Cryptography & Secure Key Exchange 🌐 by Jintai Ding
Mathematical Picture Language
575 views β€’ Apr 12, 2022
Understanding Post-Quantum Cryptography & Secure Key Exchange 🌐 by Jintai Ding

About this video

Title: Post-quantum cryptography and post-quantum key exchange based on the LWE and RLWE problems
Speaker: Jintai Ding (Tsinghua University and Beijing Institute of Mathematical Sciences and Applications)
Abstract: Public key cryptosystems (PKC) are a critical part of the foundation of modern communication systems, in particular, the Internet. However Shor's algorithm shows that the existing PKC like Diffie-Hellmann key exchange, RSA and ECC can be broken by a quantum computer. To prepare for the coming age of quantum computing, we need to build new public key cryptosystems that could resist quantum computer attacks. In this lecture, we will give a brief introduction to post-quantum cryptography. Then we will present a practical and provably secure (authenticated) key exchange protocol based on the learning with errors problems, which is conceptually simple and has strong provable security properties. This new construction was established in 2011-2012. We will explain that all the existing LWE-based key exchanges are variants of this fundamental design. In addition, we will explain how to use the signal function invented for KE for authentication schemes. Then we will discuss key reuse attacks on those key exchanges.

Video Information

Views

575

Likes

6

Duration

01:14:29

Published

Apr 12, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now