Home > Teaching > CS 674A: Post Quantum Security

CS 674A: Post Quantum Security

Credits: 3-0-0-0 (9)


Prerequisites: Knowledge equivalent of CS220 and CS641


Who can take the course: PhD, Masters, 3rd and 4th year UG Students


Departments that may be interested: CSE, EE

 

Course Objective:

Public key cryptography plays a major role in maintaining the security and integrity of commu- nication channels. However, due to the advent of quantum computing, existing public-key cryptographic algorithms like RSA or elliptic curve cryptography will cease to remain secure. Shor’s algorithm can find prime factors of integers numbers efficiently on quantum computers, thus undermining the basic security assumption of RSA and elliptic curve cryptography. Recognizing this, NIST in 2017 started a post-quantum secure public-key cryptography standardization procedure. The algorithms submitted on the NIST post-quantum standardization procedure can be classified  into five different categories:  1) Lattice 2) Code 3) Hash 4) Isogeny and 5) Multivariate.   In this course, we are going to focus on different post-quantum secure public-key algorithms that have been submitted in the NIST post-quantum standardization algorithms, focusing on both key encapsulation and digital signature algorithms.  The course apart from the detailed discussion on the functionality  of these cryptographic algorithms would also focus on the hardware implementation and side-channel security of these algorithms. The contents selected for the course are based on re- search papers from top-tier  journals and conferences such as IEEE TIFS, IACR  TCHES, IEEE TC, ACM  TECS, IEEE TVLSI, DAC, DATE,  etc.

 

Course Contents:

Module  1: Quantum  Computing

 

Basics of Quantum Computing

Shor’s Algorithm

Finite Field Operations

Karatsuba and Number Theoretic Transformation Based Multiplication

Montgomery Multiplication

 

Module  2: Lattice  Based Cryptography

 

Basics of lattice based cryptpgraphy

NewHope, Kyber and Saber (NIST post-quantum candidates)

NTRU, NTRU Prime

Digital Signature Algorithm:  Dilithium,  Falcon

 

Module  3: Code Based Cryptography

 

Classic McEliece

HQC

 

Module  4: Isogeny Based Cryptography

 

Supersigular Isogeny based Key Exchange (SIKE)

Digital Signature Algorithm based on Isogeny

 

Books:
  1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,“Hardware Security: Design, Threats, and Safeguards”, CRC Press, 2014.
  2. NIST Post Quantum Standardization- Specification document of the post-quantum secure algorithms: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions
  3. Daniel J. Bernstein, Johannes Buchmann and Erik Dahmen,“Post-Quantum Cryptography”