Post-Quantum Cryptography -- Having it implemented right
Webinar, online, by invitation (see also https://www.secure-ic.com/webinar/
Live Webinar, June 30th, 10.30am GMT+2 – "WHAT NEXT IN THE WORLD OF POST-QUANTUM CRYPTOGRAPHY? & HOW TO IMPLEMENT IT CORRECTLY", TO REGISTER FOR THIS LIVE WEBINAR
Live Webinar, June 30th, 10.30am PST – "WHAT NEXT IN THE WORLD OF POST-QUANTUM CRYPTOGRAPHY? & HOW TO IMPLEMENT IT CORRECTLY", TO REGISTER FOR THIS LIVE WEBINAR
Post-Quantum Cryptography (PQC) refers to novel requirements in asymmetric cryptography, namely key exchange, asymmetric encryption and digital signature. Namely, the computation shall resist not only attacks from classic computers, but also from quantum computers. Still, PQC are mathematical algorithms which are implemented conventionally (as software,hardware, etc.). Therefore, regular implementation-level attacks apply.
In this talk, we list the challenges associated with the implementation of PQC, in particular vulnerabilities related to side-channel analyses. First, we detail the detection and the prevention of leakage arising from conditional control-flow and from conditional access to data structures. Second, we apply the same methodology to data leakage, in the situation where the manipulated data is randomly masked.
The webinar shows that proper implementation of PQC requires knowledge of security evaluation and of secure coding. Owing to the large variety of PQC algorithms and their configurations, generic methods shall be available. Those are overviewed in this webinar, and we expect the audience to learn about secure code evaluation and design, in the framework of Catalyzr and Securyzr technologies.