![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > NewHope for ARM - An Efficient Implementation of the Post-Quantum Ephemeral Key Exchange NewHope for the ARMv6-M and ARMv7M Architecture
NewHope for ARM - An Efficient Implementation of the Post-Quantum Ephemeral Key Exchange NewHope for the ARMv6-M and ARMv7M ArchitectureAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Dr Garfield Benjamin. This presentation starts by sketching the relevance of quantum resistant cryptography in the near future. It gives a short overview of potential mathematical problems to build upon. After this introduction, it dives into the mathematical background information and details of our ARM implementation of the post-quantum key exchange NewHope. NewHope was designed and published in 2015 by Alkim, Ducas, Pöppelmann and Schwabe. It bases its security claims on lattice problems, the ring-learning-with-errors problem which is reducible to the shortest vector problem. No quantum algorithm is known which could solve them in polynomial time. Actors like the NIST , the NSA or the Tor project have recognized the relevance of post-quantum cryptography. Key exchanges prove relevant as they form the basis of forward secrecy in a world with large-scale quantum computers at the horizon. These key exchanges must be designed and proven to be efficiently implementable. We performed an implementation of NewHope on the embedded ARMv6M and ARMv7M architecture. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsVirtual Harmonic Analysis Seminar Type the title of a new list here Lab LunchOther talksUltrafast Spectroscopy and Microscopy as probes of Energy Materials Counting cycles in planar graphs The tragic destiny of Mileva Marić Einstein TBA Hunt for an Earth-twin TBC |