Understanding Post-Quantum Cryptography & Secure Key Exchange π by Jintai Ding
Explore the latest advancements in post-quantum cryptography and key exchange protocols based on LWE and RLWE problems, presented by renowned expert Jintai Ding from Tsinghua University.

Mathematical Picture Language
575 views β’ Apr 12, 2022

About this video
Title: Post-quantum cryptography and post-quantum key exchange based on the LWE and RLWE problems
Speaker: Jintai Ding (Tsinghua University and Beijing Institute of Mathematical Sciences and Applications)
Abstract: Public key cryptosystems (PKC) are a critical part of the foundation of modern communication systems, in particular, the Internet. However Shor's algorithm shows that the existing PKC like Diffie-Hellmann key exchange, RSA and ECC can be broken by a quantum computer. To prepare for the coming age of quantum computing, we need to build new public key cryptosystems that could resist quantum computer attacks. In this lecture, we will give a brief introduction to post-quantum cryptography. Then we will present a practical and provably secure (authenticated) key exchange protocol based on the learning with errors problems, which is conceptually simple and has strong provable security properties. This new construction was established in 2011-2012. We will explain that all the existing LWE-based key exchanges are variants of this fundamental design. In addition, we will explain how to use the signal function invented for KE for authentication schemes. Then we will discuss key reuse attacks on those key exchanges.
Speaker: Jintai Ding (Tsinghua University and Beijing Institute of Mathematical Sciences and Applications)
Abstract: Public key cryptosystems (PKC) are a critical part of the foundation of modern communication systems, in particular, the Internet. However Shor's algorithm shows that the existing PKC like Diffie-Hellmann key exchange, RSA and ECC can be broken by a quantum computer. To prepare for the coming age of quantum computing, we need to build new public key cryptosystems that could resist quantum computer attacks. In this lecture, we will give a brief introduction to post-quantum cryptography. Then we will present a practical and provably secure (authenticated) key exchange protocol based on the learning with errors problems, which is conceptually simple and has strong provable security properties. This new construction was established in 2011-2012. We will explain that all the existing LWE-based key exchanges are variants of this fundamental design. In addition, we will explain how to use the signal function invented for KE for authentication schemes. Then we will discuss key reuse attacks on those key exchanges.
Video Information
Views
575
Likes
6
Duration
01:14:29
Published
Apr 12, 2022
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now