Post-Quantum Cryptosystems and Their Formal Analysis
Assoc. Prof. Dr. Sedat Akleylek, Department of Computer Engineering, Ondokuz Mayıs University, Samsun, Turkey
Dr. Besik Dundua, VIAM, Tbilisi State University, Tblisi, Georgia
Dr. Mikheil Rukhaia, VIAM, Tbilisi State University, Tblisi, Georgia
The aim of this tutorial is to give an insight of post-quantum cryptography focusing lattices and their formal analysis.
There has been increasing demand to post-quantum cryptographic schemes with their security based on the computational hardness of the coding, multivariate,
lattice problems and other algebraic structures. Post-quantum cryptographic schemes refer to the algorithms that are resistant to quantum attacks.
These are the alternatives of public key cryptographic schemes such as RSA, DLP-based schemes and elliptic curve-based protocols. These schemes have been proposed
for public key encryption, signature schemes and hash functions. Post-quantum cryptographic schemes are classified into the following approaches: code-based, hash-based,
multivariate and lattice-based cryptography. Lattice-based cryptographic schemes are one of the most widely studied post-quantum cryptographic protocols. The security of
these schemes depends on the hardness of lattice problems under some parameters. NTRU is the first proposed lattice-based cryptosystem. It is one of the most thoroughly
researched and widely implemented alternative to standard public key cryptosystems. It supports faster encryption and decryption and also it requires small areas. NTRU is
standardized and commercialized post-quantum cryptosystem. Thus, its security from the theoretical point of view has been deeply analyzed. In recent years, application of
formal methods to the analysis of cryptographic protocols is experiencing a renewed period of growth with the emergence of new concepts and systems that allow a better
understanding and usability. Formal analysis of cryptographic protocols is used to model a cryptographic protocol and its security properties to verify that a protocol
is secure. In the last decades, such a formal analysis revealed security flaws in some protocols.
In this tutorial, we will introduce post-quantum cryptography with applications in real world. Then, we will focus on lattice- based cryptosystems and their formal
analysis with automated softwares. In the security side, we will analyze the methods that are resistant to well-known attacks. We will discuss about how to write a
code to analyze lattice-based cryptosystems formally. Also, we will provide some examples by considering NTRU-based cryptosystems.
This tutorial is scheduled for 3 hours (half day). The number of participants is limited to 30.
Outline
• Introduction to post-quantum cryptography
• Lattice-based cryptosystems
• NTRU-based cryptosystems
• Applications of cryptosystems in the areas of communications and network
• Basics of security analysis
• Introduction to formal analysis
• MAUDE
• Examples (NTRU, MaTRU)
• Case studies
Target Audience
This tutorial assumes a basic knowledge of public key cryptographic schemes. It does not cover theoretical mathematics. This tutorial is for the cryptographic protocol designers and software developers from academia and industry.
Acknowledgments
This work is partially supported by the joint research project funded by Shota Rustaveli National Science Foundation of Georgia (SRNSFG, no:04/03) and
Scientific and Technological Research Council of Turkey (TÜBİTAK, no:118E312).