Home > Teaching > CS 674A: Post Quantum Security

CS 674A: Post Quantum Security

Credits: 3-0-0-0 (9)

Prerequisites: Knowledge equivalent of CS220 and CS641

Who can take the course: PhD, Masters, 3rd and 4th year UG Students

Departments that may be interested: CSE, EE


Course Objective:

Public key cryptography plays a major role in maintaining the security and integrity of commu- nication channels. However, due to the advent of quantum computing, existing public-key cryptographic algorithms like RSA or elliptic curve cryptography will cease to remain secure. Shor’s algorithm can find prime factors of integers numbers efficiently on quantum computers, thus undermining the basic security assumption of RSA and elliptic curve cryptography. Recognizing this, NIST in 2017 started a post-quantum secure public-key cryptography standardization procedure. The algorithms submitted on the NIST post-quantum standardization procedure can be classified  into five different categories:  1) Lattice 2) Code 3) Hash 4) Isogeny and 5) Multivariate.   In this course, we are going to focus on different post-quantum secure public-key algorithms that have been submitted in the NIST post-quantum standardization algorithms, focusing on both key encapsulation and digital signature algorithms.  The course apart from the detailed discussion on the functionality  of these cryptographic algorithms would also focus on the hardware implementation and side-channel security of these algorithms. The contents selected for the course are based on re- search papers from top-tier  journals and conferences such as IEEE TIFS, IACR  TCHES, IEEE TC, ACM  TECS, IEEE TVLSI, DAC, DATE,  etc.


Course Contents:

Module  1: Quantum  Computing


Basics of Quantum Computing

Shor’s Algorithm

Finite Field Operations

Karatsuba and Number Theoretic Transformation Based Multiplication

Montgomery Multiplication


Module  2: Lattice  Based Cryptography


Basics of lattice based cryptpgraphy

NewHope, Kyber and Saber (NIST post-quantum candidates)


Digital Signature Algorithm:  Dilithium,  Falcon


Module  3: Code Based Cryptography


Classic McEliece



Module  4: Isogeny Based Cryptography


Supersigular Isogeny based Key Exchange (SIKE)

Digital Signature Algorithm based on Isogeny


  1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,“Hardware Security: Design, Threats, and Safeguards”, CRC Press, 2014.
  2. NIST Post Quantum Standardization- Specification document of the post-quantum secure algorithms: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions
  3. Daniel J. Bernstein, Johannes Buchmann and Erik Dahmen,“Post-Quantum Cryptography”