symposium logo

Symposium Series on Post-Quantum Cryptography


Symposium Series

The Symposium Post-Quantum Cryptography is part of a series organized by CWI Cryptology Group and TNO. The symposium is aimed at higher management and security professionals from government, private sector, and industry. The first symposium in April 2021 was a general introduction to the problem from the perspective of industry, government, and end user. The second episode of November 2021 zoomed in on a number of specific topics, including quantum-safe PKI, the relation between PQC and QKD, and PQC standards & implementation. The third symposium on April 21st 2022, showed the insights of “Early Movers” from industry and government that are working on quantum-safe products, and are aware of the latest developments.

Post-Quantum Cryptography

Cryptography is at the heart of internet security. However, much of the currently deployed cryptography is vulnerable to quantum attacks, which will become effective once large-scale quantum computers become feasible. Therefore, the affected cryptographic standards must be replaced by ones that offer security against quantum attacks. The post-quantum cryptography transition may take organizations ten years to complete, or longer. To remain secure and comply with legal and regulatory requirements, affected organizations should act now. What do you need to know - and what can you do - in order to continue your course of business securely?

Symposium Post-Quantum Cryptography - Episode IV


Theme:  Act now, not later: "The Maiden Voyage"
Date and time:  Tuesday November 15, 2022
Location:  ZZIIN Conference Center - The Hague Central Station, Koningin Julianaplein 10, 2595 AA Den Haag

Theme

Now that the first standards have been set, we are ready to embark upon “The Maiden Voyage” on November 15th 2022. Leading researchers behind the first selected standards will explain them in person, and industrial players at the forefront of PQC-migration will describe the consequences of these standards for their cryptographic products.

Program

09:30-10:00   Walk in with coffee and tea
10:00-10:05Welcome by Chris van 't Hof (Tek Tok)
10:05-11:10NIST PQC draft standards session led by Maran van Heesch (TNO) (slides)
- Léo Ducas (CWI Cryptology Group): Dilithium and Kyber (slides)
- Thomas Prest (PQShield): Falcon (slides)
- Andreas Hülsing (TU/e): SPHINCS+ (slides)
- Q & A
11:20-11:35Break
11:35-11:40Newsflash
11:40-12:20Keynote 1: Oscar Koeroo (MinVWS) (slides)
12:20-13:00Keynote 2: Bas Westerbaan (Cloudflare) (slides)
13:00-13:45Lunch
13:45-14:15Keynote 3: Christine Cloostermans (NXP) (slides)
14:15-14:45Keynote 4: Dieter Bong (Utimaco) (slides)
14:45-15:45Panel discussion
15:45-15:50Wrap up
15:50-Drinks and bites

Host


photo chris

   Chris van 't Hof
Chris van ’t Hof is an independent researcher, writer and presenter in information technology. With his background in both electrical engineering and sociology, he analyses the interaction between human and electronic networks. With his company Tek Tok, he makes complicated matters in science and technology fun. Since January 2022, he is director of DIVD, the Dutch Institute for Vulnerability Disclosure.

Speakers


photo leo

   Léo Ducas: "Dilithium and Kyber"
Léo Ducas is researcher at the Cryptology Group at CWI and full professor at Leiden University. He is one of the submitters of the upcoming NIST standards Dilithium and Kyber.

photo thomas

Thomas Prest: "Falcon"
Thomas Prest is Lead Cryptography Researcher at PQShield, and one of the submitters of the upcoming NIST standard Falcon. His main research topics are post-quantum cryptography -with a focus on lattices-, and secure messaging protocols.

photo andreas

Andreas Hülsing: "SPHINCS+: Efficient stateless hash-based signatures"
Andreas Hülsing is assistant professor for provable security in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). His research focuses on post-quantum cryptography – cryptography that resists quantum computer-aided attacks.

photo oscar

Oscar Koeroo: "How do you upgrade a government to become post quantum crypto secure?"
Oscar Koeroo works as the Chief Information Security Officer for the Ministry of Health, Welfare and Sport which is composed out of various organizations. He's a technical oriented CISO and part-time lectures on PKI and TLS.
The CIO Rijk has started a project to create a plan and define the execution required to upgrade the government into a PQC-ready era. Oscar is co-lead for the implementation track.

photo bas

Bas Westerbaan: "The road to a Post-Quantum Internet"
dr. Bas Westerbaan, research engineer, works to drive the adoption of post-quantum cryptography at Cloudflare and the Internet at large. His works range from cryptographic implementation, real-world large-scale experimentation, to contributing to standards. https://blog.cloudflare.com/post-quantum-for-all/.

photo christine

Christine Cloostermans: "Post-quantum Cryptography for Small Devices; the complexity of running PQC algorithms on very constrained devices"
Christine Cloostermans is a Principal Cryptography Architect at NXP Semiconductors, where her main work is in Post-Quantum Cryptography (PQC) team. She works mainly on side-channel protection and migration aspects of PQC on embedded devices.

photo dieter

Dieter Bong: "A bouquet of (crypto) flowers"
Dieter Bong has more than 30 years of experience in IT security in the areas of encryption and digital signatures, network security, public key infrastructure (PKI) and hardware security modules (HSM). For more than 15 years, he is responsible for Utimaco's Hardware Security Module portfolio as Product Manager HSM.


Participation

The Symposium Post-Quantum Cryptography requires registration. For more information, please contact: projectoffice (AT) tno.nl. More information on previous editions can be found here.

Organizing Committee

  • Ronald Cramer (CWI & University Leiden)
  • Serge Fehr (CWI & University Leiden)
  • Maran van Heesch (TNO)
  • Marc Stevens (CWI)
  • Thijs Veugen (TNO & CWI)
logo CWI
logo TNO


>