At the moment, communication between electronic systems is secured by means of cryptography to achieve confidentiality, integrity and authenticity. Almost all wide-spread cryptosystems are at least partially based on number-theoretic assumptions related to integer factorization or computing discrete logarithms in finite groups. A major problem is that Peter Shor developed a polynomial-time algorithm that factors integers and computes discrete logarithms. The only reason why we can still use methods based on these problems for security is that Shor's algorithm requires a sufficiently large quantum computer and that this does not exist, yet. However, progress in theoretical and applied physics is bringing such a computer within reach for the next decade or two. Therefore, experts caution that it is high time to switch systems to using cryptography based on different mathematical assumptions that are not broken by quantum computers.
Post-quantum cryptography (PQC) is cryptography under the assumption that the attacker has a large quantum computer. Current proposals on PQC produce data objects that are larger than for our currently deployed systems, which might cause trouble with the bandwidth of input or output. Furthermore, real-world applications need to combine these building blocks into a larger sequence of operations, called a cryptographic protocol, summing up to even larger data objects and often enough, require special properties. While these requirements are challenging for notebooks, smartphones, desktop computers, and internet servers, they pose a significant burden on small computing devices, so called embedded devices, that are implanted into today's technology like cars, refrigerators, and industry appliances.
The goal of this workshop is to tackle the challenges of PQC for embedded devices. The workshop will bring together researchers from academia and industry to jointly identify the problems of PQC for applications in embedded devices and start exploring solutions. The most important outcome of the workshop will be the initialization of lasting collaborations between industry as one of the user groups of PQC and researchers that develop and implement PQC. This will allow to communicate requirements from industrial use cases, and to identify the limitations of existing proposals. In the longer run, we expect that the initiated collaborations lead practical solutions that enable post-quantum security for embedded devices.
09:00 | 10:00 | Aririval, registration | |
10:00 | 10:30 | Welcome by Lorentz Center | |
10:30 | 12:00 | Tutoral Talk I | |
12:00 | 13:30 | Lunch and formal discussions | |
13:30 | 15:00 | Tutorial talk II | |
15:00 | 15:30 | Tea & coffee break | |
15:30 | 17:00 | Plenary discussion to identify 6-8 work items and form working groups | |
17:00 | 18:30 | Wine & cheese party and poster session |
09:00 | 09:45 | Industry use cases I | |
09:45 | 10:30 | Industry use cases II | |
10:30 | 11:00 | Tea & coffee break | |
11:00 | 12:00 | Working group session 1 | |
12:00 | 13:30 | Lunch and informal discussions | |
13:30 | 15:30 | Working group session 2 | |
16:00 | 16:30 | Brief progress reports from working groups with discussion | |
16:30 | 17:00 | Contributed talks I |
09:00 | 10:00 | Tutorial talk II | |
10:00 | 10:30 | Tea & coffee break | |
10:30 | 12:00 | Working group session 3 | |
12:00 | 13:30 | Lunch and informal discussions | |
13:30 | 14:30 | Reports from working groups and possibily new groups | |
14:30 | 15:00 | Tea & coffee break | |
15:00 | 16:30 | Working groups session 4 | |
17:00 | 21:00 | Workshop dinner |
09:00 | 10:30 | Contributed talks II | |
10:30 | 11:00 | Tea & coffee break | |
11:00 | 12:00 | Working groups session 5 | |
12:00 | 13:30 | Lunch and informal discussions | |
13:30 | 15:00 | Working group session 6 | |
15:00 | 15:30 | Tea & coffee break | |
15:30 | 16:30 | Working group session 7 | |
16:30 | 17:00 | Brief progress reports from working groups with discussion |
09:00 | 10:30 | Contributed talks III | |
10:30 | 11:00 | Tea & coffee break | |
11:00 | 12:00 | Working group session 8 | |
12:00 | 13:30 | Lunch and informal discussions | |
13:30 | 15:00 | Final presentations by each of the working groups with discussion | |
15:00 | 15:30 | Final discussion and conclusions of the week | |
15:30 | 16:00 | Tea & coffee adjourn |