M04 Security in the Post-Quantum Era: Threats and Countermeasures
The advancements in the area of high fidelity qubit technologies, resilient quantum circuits and algorithms have fuelled the development of scalable quantum computers. This brings forth serious consequences for security, especially, the public-key cryptography. The dominant protocols in the public-key cryptography are shown to be vulnerable in face of a quantumenabled adversary. Therefore, it is of prime importance to understand these trends, and how the security research is gearing up to address these challenges.
This tutorial will discuss the growth of scalable quantum computers, their challenges and the latest research to solve practical problems using NISQ computers. Glue talks will cover the corresponding threats caused by these machines. Based on that, the tutorial will discuss various post-quantum primitives. Finally, new vulnerabilities in post-quantum cryptography are presented, opening up a new research direction.
The detailed program is as follows:
- Challenges of Scalable Quantum Computing
- Quantum Technology Overview (Swaroop Ghosh)
- EDA for Quantum Computing (Robert Wille)
- Scalable Quantum Computer (Koen Bertels)
- Security Threats from Quantum Computers (Anupam Chattopadhyay)
- Post-Quantum Security Primitives
- Quantum Key Distribution (Francesco Regazzoni)
- Quantum Random Number Generators (Swaroop Ghosh)
- Post-Quantum Cryptography (Sujoy Sinha Roy)
- Beyond Post-Quantum Security (Shivam Bhasin)
Please register for the tutorial on this page.