After a successful 1st edition of the Utimaco Applied Crypto Symposium in Los Gatos, California in November 2017, we are bringing this concept to Europe. We will host the symposium in the well-renowned Maritim Hotel Bonn, venue for numerous IT security conferences and exhibitions and located opposite from the BSI.
The Utimaco Applied Crypto Symposium aims at providing insight into Post-Quantum Cryptography and what role HSMs play in this context. Learn about existing and future application scenarios, discuss challenges and solutions with industry experts from ISARA, BSI, Fraunhofer SIT, DigiCert, Utimaco and the world-renowned cryptographer Professor Dr. Joan Daemen (Radboud University Nijmegen and STMicroelectronics).
It will be a 1-day event, free of charge for you as a participant. Please note: travel and accommodation are at your own expense.
09:45 Dr. Manfred Lochter, Requirements for and Development of Cryptographic Mechanisms, BSI
“Quantum Technology and IT Security”
10:30 Dr. Ruben Niederhagen, Leader of the ‚Post-Quantum Cryptography‘-Team, Fraunhofer SIT
“Post-Quantum Cryptography – Overview and Challenges”
11:15 Professor Dr. Joan Daemen, Belgian cryptographer, Radboud University Nijmegen and STMicroelectronics
“Symmetric Cryptography 2.0 for a Post Quantum World”
13:30 Mike Brown, CTO & co-founder, Alexander Truskovsky, Senior Product Manager, ISARA Corp.
“Quantum-Safe Digital Signature Options”
14:15 Avesta Hojjati, Senior Director of R&D, DigiCert Inc.
“Our Toys Today, Their Weapons Tomorrow; Threats of Post Quantum Computers in the Security Industry”
15:00 Thorsten Grötker, CTO, Utimaco
15:30 PQC Panel – The Next Generation
16:00 Closing Remarks & Coffee
|>> CONTACT US <<||>> REGISTER HERE <<|
We are proud to present the following speakers:
Dr. Manfred Lochter, Requirements for and Development of Cryptographic Mechanisms, Bundesamt für Sicherheit in der Informationstechnik (BSI)
|Dr. Manfred Lochter is part of BSI since 1994. His main working areas include public key cryptography, side channel analysis and standardisation. Manfred Lochter was born in June 1963 in Cologne and studied Mathematics and Physics in Cologne – where he finished his PhD in 1992 – and Saarbrücken.
Abstract: Quantum technologies pose a threat to IT security and – at the same time – offer potential solutions. In the talk, different IT security aspects of quantum technologies are discussed from a cryptographic perspective.
Dr. Ruben Niederhagen, Leader of the ‚Post-Quantum Cryptography‘-Team, Fraunhofer SIT
|Dr. Ruben Niederhagen has been leading a research group on the topics “Post-Quantum Cryptography” and “Long-Term Security” at Fraunhofer SIT in Darmstadt (Germany) since October 2016. Before he joined Fraunhofer SIT, he was postdoctoral researcher at Eindhoven University of Technology and at Academia Sinica in Taiwan. He obtained his PhD at Eindhoven University of Technology in 2012.
Abstract: This presentation gives a brief introduction into the topics “Quantum-Cryptanalysis” and “Post-Quantum Cryptography” and into the challenges that arise for the implementation and deployment of post-quantum schemes.
Professor Dr. Joan Daemen, Belgian cryptographer, Radboud University Nijmegen and STMicroelectronics
|Joan Daemen is full Professor symmetric cryptography at Radboud University and is also affiliated to STMicroelectronics as a security architect. He works in symmetric cryptography and is best known for the design of Rijndael together with Vincent Rijmen and the conception of sponge functions and Keccak, together with Guido Bertoni, Gilles Van Assche and Michaël Peeters. The former won the AES contest in 2000 and the latter won the SHA-3 contest in 2012. His current research interests include permutation-based symmetric cryptography, secure implementations, correlation matrices and key management.
Abstract: Symmetric cryptography is the subfield of cryptography that deals with encryption, MAC computation and authenticated encryption secured by shared secret keys and cryptographic hashing. Ever since the introduction of DES in the seventies, this field has been dominated by block ciphers. Encryption, authentication and hashing are usually performed using modes of block ciphers. Over the years an impressive panoply of modes of ever-increasing complexity have been developed: CBC, CBC-MAC, Counter-mode, GCM, Davies-Meyer with Merkle-Damgard, OCB, just to name a few. This has lead to a rather messy situation. I will speak about a counter-movement we started to clean up symmetric cryptography. In particular, this is a re-factoring where block ciphers are replaced by cryptographic permutations and pseudorandom functions as central primitives and we call it Symmetric Cryptography 2.0. An important milestone in this movement was the introduction of sponge functions for hashing in 2007 but has roots that go back to the early nineties. It turns out that permutation-based cryptography is at the same time simpler and more efficient than old-school block cipher based crypto.
Mike Brown, Chief Technology Officer & co-founder & Alexander Truskovsky, Senior Product Manager, ISARA Corporation
|As ISARA Corporation’s Chief Technology Officer and co-founder, Mike Brown is focused on the technical vision and direction for ISARA Corporation. Mike was most recently the Vice President of Security Product Management and Research at BlackBerry, where he co-founded the product security practice and was responsible for the vision and execution of security for all BlackBerry products. Mike has spoken at global security events including RSA, CTIA, GTEC, Bloomberg, APECTEL and InfoSec Europe. He holds a Masters of Mathematics from the University of Waterloo, focusing on cryptography.
Abstract: The forthcoming arrival of the quantum computer threatens current cryptographic systems. Embedded roots of trust and code signing are currently of particular concern for vehicles, IoT devices, satellites, and other equipment where in-field updates can range from financially prohibitive to logistically impossible. We discuss quantum-safe digital signature options for this purpose.
Avesta Hojjati, Senior Director of R&D, DigiCert Inc.
|Avesta Hojjati is senior director of R&D at DigiCert where he manages advanced development of cybersecurity products. Before joining DigiCert, Avesta was part of the Symantec and Yahoo security teams. Avesta focuses on applied cryptography, post quantum crypto, blockchain, and IoT. Avesta earned his Masters in computer science with a concentration on security from University of Illinois at Urbana Champaign, and he’s currently completing his PhD thesis on applications of blockchain and IoT in manufacturing.
Abstract: Quantum computing is still in its infancy but already poses challenges to digital security. We’ll look at the high-level issues that Certificate Authorities face, as well as the threats to security-sensitive industries like finance and health care. We’ll also discuss how CAs are preparing these industries for the post-quantum crypto era.
Thorsten Grötker, Chief Technology Officer, Utimaco
|As CTO of Utimaco, Thorsten Groetker shares responsibility for technological strategy and R&D operations. He joined Utimaco after 16 years with Synopsys, Inc., where he served in a range of engineering management positions. Groetker earned a doctorate degree (SCL) in electrical engineering from Aachen University of Technology (RWTH). He co-authored “System Design with SystemC” and “The Developer’s Guide to Debugging”.
Abstract: In his presentation Thorsten will cover post-quantum cryptography-related activities at Utimaco. In addition to addressing technology platforms, we will describe different engagement models for development and certification.
|Thorsten Grötker as host & all speakers||PQC Panel – The Next Generation:
Will quantum computers deliver the warp drive to go where no one has gone before? Join our post-quantum experts on new crypto concepts 2018. Is this a game changer? And will the next generation of cryptographic algorithms fulfill all our requirements?
We look forward to welcoming you in Bonn!
Your UTIMACO Team
Maritim Hotel, Bonn