[crypto] Fwd: CWG program
R. Hirschfeld
ray at unipay.nl
Mon Sep 1 20:16:15 CEST 2025
-------- Original Message --------
Subject: CWG program
Date: 2025-09-01 16:18
From: "Guarise Vieira, Heloise" <h.guarise.vieira at tue.nl>
To:
Dear all,
Find below the program for the next CWG this Friday, at the Kargadoor,
in Utrecht.
Best regards,
10:45h
Speaker: Solane El Hirch
Title: Tearing Solutions for Tree Traversal in Stateful Hash-based
Cryptography
Abstract. Stateful hash-based signature schemes are a family of
post-quantum signature schemes. XMSS and LMS, two digital signature
schemes standardized by NIST, belong to this family. Both are structured
as a collection of one-time signature key pairs, which are combined
using Merkle
binary tree. They rely on tree traversal algorithms to optimize time
versus memory efficiency, reducing the signing time of the schemes at the
cost of managing a larger amount of auxiliary data (i.e, state). In this
paper, we focus on XMSS with the BDS algorithm when used in a practical
setting on an embedded device. One challenge on such devices is that
they can experience a loss of power unexpectedly. For instance, an NFC
chip might be torn away from its power source In the case of such a
tearing event, the validity of the state can be impacted: the algorithm
does not update the state correctly if such an event occurs. We propose
an algorithm based on BDS that we call BDSFix. This algorithm recovers
the BDS state following a tearing event. Our algorithm either equals
(for a single tearing event) or outperforms recovering the state through
BDS for any number of tearings larger than 1. This ranges from a 9%
speed-up for six subsequent tearing events to improvements by factors of
up to 8 for a large number of tearing events.
11:30 – Coffee Break
11:45h
Presenter: Jolijn Cottaar
Title: Continued-Fraction Differential Addition Chains
Abstract: Elliptic curves are an essential part of both pre-quantum
cryptography (ECDH) and post-quantum cryptography (isogenies). In both
cases there is the need to calculate scalar multiples of a point of an
elliptic curve over a finite field. Traditional solutions contain
different types of addition chains (for example Montgomery ladder). In
this talk I will give a quick overview of different types of chains and
where these are used. I will mainly focus on the continued-fraction
differential addition chain, introduced by Motngomery. In practice these
chains are usually found using a slow algorithm. I will explain the two
(or three) new algorithms we introduced in our ANTS XVI paper "Searching
for Differential Addition Chains" by Bernstein, Cottaar and Lange.
12:30h – Lunch
14:00h
Presenter: Yanis Belkheyar
Title: Sonic: A low-Latency Permutation Family
For many latency-critical operations in computer systems, like memory
reads or pointer authentication, adding encryption can significantly
impact performance.
Hence, the existence of cryptographic primitives with good security
properties and minimal latency is a key element in the widespread
implementation of such security measures.
This paper introduces Sonic, a new family of low-latency permutations
inspired by the Simon block ciphers.
Comparing different metrics, we show the improvement of Sonic over
Simon, in both, security and performance.
We also instantiate an Even-Mansour construction with 18 rounds of
Sonic256 and a Kirby construction with 16 rounds Sonic256, and a duplex
construction with 12 rounds of Sonic512 to build ciphers for which we
provide security analysis and performance tests.
Our permutations are primarily designed for hardware implementations but
are also expected to be quite competitive in software implementations.
14:45h – Coffee Break
15:00h
Presenter: Jonathan Levin
Title: PQConnect: Automated Post-Quantum End-to-End Tunnels
A major software engineering challenge spurred by the threat of quantum
computers is the rapid and widespread deployment of post-quantum
cryptography (PQC) to the Internet.
Researchers and engineers are currently working to integrate PQC into
existing cryptographic network protocols, most notably TLS.
This process, however, is slow, labor-intensive, and not trivial.
This talk presents PQConnect, a new post-quantum tunneling protocol that
provides a complementary pathway to protecting network traffic with PQC
now, while applications continue the hard work to integrate post-quantum
schemes into their network security.
PQConnect functions similarly to an VPN, in that it cryptographically
protects entire packets between clients and servers, and applications
are automatically protected without needing to be aware of PQConnect.
Unlike a VPN, however, PQConnect requires no pre-existing knowledge of
peers or a proxy, and cryptographic security is extended end-to-end.
Clients running PQConnect automatically discover servers that also run
PQConnect, and automatically establish a secure, post-quantum tunnel
with the server.
All application traffic between client and server is then encrypted and
routed through the tunnel.
PQConnect software is currently available for GNU/Linux and has been
packaged in Debian, with development for other platforms currently in
progress.
15:45h – End of activities
--
[Image]
Heloise Vieira, PhD
Discrete Mathematics Cluster, Project Leader
Department of Mathematics and Computer Science
Phone number +31 (0)402474864
De Zaale, Eindhoven
05 MetaForum, MF 5.120
More information about the crypto
mailing list