research of post-quantum cryptography in china...research of post-quantum cryptography in china jiwu...
TRANSCRIPT
![Page 1: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/1.jpg)
Research of Post-Quantum Cryptography in China
Jiwu Jing Data Assurance and Communications Security Research Center
Chinese Academy of Sciences
![Page 2: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/2.jpg)
Quantum Revolution
Quantum Precision Measurement
Quantum Communication
QuantumComputation
![Page 3: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/3.jpg)
Contents Background Projects and Results Trends
![Page 4: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/4.jpg)
RSA3072
SHA-512SHA-224 SHA-384SHA-256SM3
AES128SM4
Classical Cryptographic Schemes
DES
56bit1999
2DES
80bit2010
3DES
112bit2030
128bit2040
192bit2080
256bit2120
SHA-1
RSA1024 RSA2048
AES192 AES256
DSA256SM2DSA160 DSA224 DSA384 DSA512
Safe world without quantum computingCurrent schemes can used for 100 years
![Page 5: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/5.jpg)
Quantum Computers
Temporal Defense Systems Inc. (TDS)
![Page 6: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/6.jpg)
Scheme Affect
Symmetric Key (SM4,AES) Security Halved (Grover)
Hash(SM3,SHA-3) Security Decreased(Grover
Public Key (RSA,DSA,SM2) Completely Broken(Shor)
Lattice Cryptography Quantum Safe (Currently)
Multivariant Cryptogrphy Quantum Safe (Currently)
Hash based signature Quantum Safe (Currently)
Code-based cryptography Quantum Safe (Currently)
Isogeny Cryptography Quantum Safe (Currently)
Affect of Quantum Computing
![Page 7: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/7.jpg)
Candidates of NIST PQC
![Page 8: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/8.jpg)
PQC Events in China
20182010
PQC key projects in NSFC
PQC projects in Cryptography Development Fund
2015
Lattice Cryptography Summer School 2016
2016 June 9-101st Asia PQC Forum
PQCSummer School 2018
Submit Candidates & Cryptanalysis to NIST PQC Standardization
2018.6 CACRPQC Competition
![Page 9: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/9.jpg)
Candidates Submitted to NIST PQC
Algorithms Inventors
Lepton Yu yu, Shanghai Jiaotong University, ChinaZhangjiang, State Key Laboratory of Cryptology, China
KCL Yunlei Zhao, Zhengzhong jin, Boru Gong, Guangye SuiFudan University, China
LAC Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue, Jingnan HeDACAS, Chinese Academy of Sciences
Zhenfei Zhang, OnBoard Security Inc
![Page 10: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/10.jpg)
1st Candidate Submitted to NIST PQC
The only candidate based on LPN problemSuitable for low-power devices even RFID
![Page 11: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/11.jpg)
1st Candidate Submitted to NIST PQC
LPN is the simplest version of the hard learning problem family
![Page 12: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/12.jpg)
1st Candidate Submitted to NIST PQC
Hardness of LPN
![Page 13: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/13.jpg)
1st Candidate Submitted to NIST PQC
Main obstacle: public-key and ciphertext size
![Page 14: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/14.jpg)
2nd Candidate Submitted to NIST PQC
Optimal Key Consensus inPresence of Noise.
![Page 15: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/15.jpg)
2nd Candidate Submitted to NIST PQC
General Framework for PKE, KE
![Page 16: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/16.jpg)
2nd Candidate Submitted to NIST PQC
KCL vs NewHope
![Page 17: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/17.jpg)
3rd Candidate Submitted to NIST PQC
The only byte-level modulus and bit-level noiseRing-LWE based scheme
![Page 18: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/18.jpg)
3rd Candidate Submitted to NIST PQC
NewHope: n=1024, = 8, 12289q
Kyber: n=256*3, =2 6, 7 81q
LAC: n=512, =1 / 2 5, 2 1q
![Page 19: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/19.jpg)
3rd Candidate Submitted to NIST PQC
=
AVX2 30 times speed up:150 microseconds to 5 microseconds
_mm256_maddubs_epi16
1a 2a
1c
1b 2b
1 1 1 2 2c ab a b
![Page 20: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/20.jpg)
μs
3rd Candidate Submitted to NIST PQC
![Page 21: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/21.jpg)
1st Cryptanalysis of NIST PQC Candidate
Break DRS Scheme
![Page 22: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/22.jpg)
1st Cryptanalysis of NIST PQC Candidate
statistical attack with deep learning
![Page 23: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/23.jpg)
2rd Cryptanalysis of NIST PQC Candidate
Break HK17 Scheme
![Page 24: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/24.jpg)
2rd Cryptanalysis of NIST PQC Candidate
![Page 25: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/25.jpg)
3rd Cryptanalysis of NIST PQC Candidate
Break Compact-LWE Scheme
![Page 26: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/26.jpg)
3rd Cryptanalysis of NIST PQC Candidate
LWE with structured noise
![Page 27: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/27.jpg)
Attend ISO/IEC SC27 WG2 SD8
Attend the PQC project of ISO
![Page 28: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/28.jpg)
Trends of PQC in China
20252018
Standardization
Theoretical Research of PQC:design & quantum computing cryptanalysis
2020
Application
Prototype
![Page 29: Research of Post-Quantum Cryptography in China...Research of Post-Quantum Cryptography in China Jiwu Jing Data Assurance and Communications Security Research Center Chinese Academy](https://reader033.vdocument.in/reader033/viewer/2022052007/601b114023e4106cc3128be0/html5/thumbnails/29.jpg)
Thanks!