Page 18 - My FlipBook
P. 18
tlight Projects亮
點
計
畫 Cryptography and Quantum Computation
Principal Investigators: Dr. Bo-Yin Yang and Dr. Kai-Min Chung
Project Period: 2018/1-2021/12
Traditionally, cryptography is about achieving secrecy applications", fundamentally is a period-finding method that
and authenticity and other desired functionalities while can "break" the RSA cryptosystem and ECC (Elliptic Curve
withstanding adversarial behaviors, which can be viewed as a Cryptography). Although the advent of quantum computing
battle between honest parties and their adversaries. After more has been slower than expected, NIST have cautiously predicted
than three decades of research, cryptography has become that quantum computers will decode ECC by as early as 2030.
an extremely rich field with significant practical impact. Due to the challenges of all society migrating to a new
Theoretically, it has evolved far beyond the traditional goal cryptography infrastructure, it is a pressing issue that must
of secure communications, enabling us to realize seemingly be addressed now. Not only is it a critical issue, but it has
contradictory tasks such as zero-knowledge proofs, secure serious implications in terms of both cost (inferred from the
multi-party computation, and computation over encrypted costs of the Y2K transition) and time (as industry has not fully
data, whilst providing rigorous security guarantees. On the transitioned to AES despite the passing of two decades). Post-
practical side, it serves as a fundamental building block of quantum cryptography (PQC) is a rapidly-growing research
modern cybersecurity; every single connection to Google or
any of thousands of websites involve use of cryptography. eld that addresses this challenge, involving the development
Modern web commerce could not survive without it. of cryptosystems (usually public-key cryptosystems) that are
We have been devoted to both the theoretical and practical secure against quantum adversaries.
elements of cryptography. Dr. Bo-Yin Yang is co-author of the Quantum technology can also be viewed as a double-edged
widely-used Ed25519 Digital Signature Scheme. Ed25519 will sword. Although it is much less likely to become practical in the
be included in the FIPS 186-5 standard of the U.S. National foreseeable future, quantum computing enhances the power
Institute of Standards and Technology (NIST), and is employed of honest parties to achieve stronger functionality or security.
by hundreds of millions of users. Bo-Yin and Dr. Bow-Yaw Wang There has been a rich development in theoretical cryptography
also pioneered research on HACS (High Assurance Crypto exploring the various exciting possibilities arising when we
Software) for formal verification of cryptographic software. (the honest parties), and not just they (the adversaries), have
On the theoretical side, Dr. Kai-Min Chung has studied quantum computers.
fundamental theoretical topics such as zero-knowledge proofs
and cryptography in the (parallel) RAM model.
Given recent rapid developments in the building of quantum
computers, it has become imperative to understand the
effect of quantum technology in cryptography. Quantum
computing, in the form of Shor’s algorithm, can devastate
currently deployed public-key cryptography. Shor's algorithm,
one of a few currently recognized quantum computing "killer
Post-quantum Cryptography
Cryptography is the field in which quantum computing has those cryptosystems was held in August 2019. Round 3 of the
made the earliest and most visible real-world impact. NIST standardization process is expected to begin in June 2020, with
began discussing a new post-quantum standard in 2015,
ultimately calling for proposals in 2016 with a deadline of 2017. nal candidates being announced in 2022 and standardization
Over the past four years, almost every real-world cryptographer taking another 1-3 years. This process is broadly similar to the
has been involved in the design, implementation or AES and SHA-3 competitions run by NIST.
cryptanalysis of post-quantum public-key cryptosystems. Dr. Bo-Yin Yang has worked on post-quantum cryptography for
NIST is currently undergoing Round 2 of the process for more than a decade and is an internationally renowned scholar
standardizing post-quantum cryptosystems. Of the 82 in this eld. From its earliest days, he has sat on the Steering
entries initially submitted, 69 were considered appropriate Committee of PQCrypto, an international workshop series on
and sufficiently complete to call a conference in April 2018. PQC. His team was the only one from Taiwan to participate in
PQC researchers from around the world are participating in the NIST call for proposals in 2017.
this standardization process. They have been studying and Bo-Yin is an expert in the class of cryptosystems known as
attempting to break rst-stage candidate cryptosystems upon multivariates, the security of which is based on the difficulty
their release. Of 50 as yet unbroken candidate cryptosystems, of solving multivariate nonlinear systems of equations. He
NIST selected 26 (17 encryption schemes and 9 digital has generated many theoretical and practical results on
signatures) to advance to Round 2. A second conference on multivariates and has been involved in the design of almost all
16
點
計
畫 Cryptography and Quantum Computation
Principal Investigators: Dr. Bo-Yin Yang and Dr. Kai-Min Chung
Project Period: 2018/1-2021/12
Traditionally, cryptography is about achieving secrecy applications", fundamentally is a period-finding method that
and authenticity and other desired functionalities while can "break" the RSA cryptosystem and ECC (Elliptic Curve
withstanding adversarial behaviors, which can be viewed as a Cryptography). Although the advent of quantum computing
battle between honest parties and their adversaries. After more has been slower than expected, NIST have cautiously predicted
than three decades of research, cryptography has become that quantum computers will decode ECC by as early as 2030.
an extremely rich field with significant practical impact. Due to the challenges of all society migrating to a new
Theoretically, it has evolved far beyond the traditional goal cryptography infrastructure, it is a pressing issue that must
of secure communications, enabling us to realize seemingly be addressed now. Not only is it a critical issue, but it has
contradictory tasks such as zero-knowledge proofs, secure serious implications in terms of both cost (inferred from the
multi-party computation, and computation over encrypted costs of the Y2K transition) and time (as industry has not fully
data, whilst providing rigorous security guarantees. On the transitioned to AES despite the passing of two decades). Post-
practical side, it serves as a fundamental building block of quantum cryptography (PQC) is a rapidly-growing research
modern cybersecurity; every single connection to Google or
any of thousands of websites involve use of cryptography. eld that addresses this challenge, involving the development
Modern web commerce could not survive without it. of cryptosystems (usually public-key cryptosystems) that are
We have been devoted to both the theoretical and practical secure against quantum adversaries.
elements of cryptography. Dr. Bo-Yin Yang is co-author of the Quantum technology can also be viewed as a double-edged
widely-used Ed25519 Digital Signature Scheme. Ed25519 will sword. Although it is much less likely to become practical in the
be included in the FIPS 186-5 standard of the U.S. National foreseeable future, quantum computing enhances the power
Institute of Standards and Technology (NIST), and is employed of honest parties to achieve stronger functionality or security.
by hundreds of millions of users. Bo-Yin and Dr. Bow-Yaw Wang There has been a rich development in theoretical cryptography
also pioneered research on HACS (High Assurance Crypto exploring the various exciting possibilities arising when we
Software) for formal verification of cryptographic software. (the honest parties), and not just they (the adversaries), have
On the theoretical side, Dr. Kai-Min Chung has studied quantum computers.
fundamental theoretical topics such as zero-knowledge proofs
and cryptography in the (parallel) RAM model.
Given recent rapid developments in the building of quantum
computers, it has become imperative to understand the
effect of quantum technology in cryptography. Quantum
computing, in the form of Shor’s algorithm, can devastate
currently deployed public-key cryptography. Shor's algorithm,
one of a few currently recognized quantum computing "killer
Post-quantum Cryptography
Cryptography is the field in which quantum computing has those cryptosystems was held in August 2019. Round 3 of the
made the earliest and most visible real-world impact. NIST standardization process is expected to begin in June 2020, with
began discussing a new post-quantum standard in 2015,
ultimately calling for proposals in 2016 with a deadline of 2017. nal candidates being announced in 2022 and standardization
Over the past four years, almost every real-world cryptographer taking another 1-3 years. This process is broadly similar to the
has been involved in the design, implementation or AES and SHA-3 competitions run by NIST.
cryptanalysis of post-quantum public-key cryptosystems. Dr. Bo-Yin Yang has worked on post-quantum cryptography for
NIST is currently undergoing Round 2 of the process for more than a decade and is an internationally renowned scholar
standardizing post-quantum cryptosystems. Of the 82 in this eld. From its earliest days, he has sat on the Steering
entries initially submitted, 69 were considered appropriate Committee of PQCrypto, an international workshop series on
and sufficiently complete to call a conference in April 2018. PQC. His team was the only one from Taiwan to participate in
PQC researchers from around the world are participating in the NIST call for proposals in 2017.
this standardization process. They have been studying and Bo-Yin is an expert in the class of cryptosystems known as
attempting to break rst-stage candidate cryptosystems upon multivariates, the security of which is based on the difficulty
their release. Of 50 as yet unbroken candidate cryptosystems, of solving multivariate nonlinear systems of equations. He
NIST selected 26 (17 encryption schemes and 9 digital has generated many theoretical and practical results on
signatures) to advance to Round 2. A second conference on multivariates and has been involved in the design of almost all
16