Conference details
On November 7 and 8, 2023 the PKI Consortium hosted their second hybrid Post-Quantum Cryptography (PQC) Conference in Amsterdam, the Netherlands.
The conference welcomed business leaders, industry experts, and representatives from various public and private sectors interested in PQC, offering a diverse program featuring keynote speeches, breakout sessions, panel discussions, and workshops.
The conference was open for anyone interested in preparing for Post-Quantum Cryptography and not limited to the members of the PKI Consortium.
Sponsors
We are immensely grateful to our sponsors:
Sponsor the next conference
Are you interested in sponsoring the next Post-Quantum Cryptography Conference? For further details regarding sponsorship opportunities within the PKI Consortium and specifically for the PQC Conference, please reach out to us.
Agenda
The presentations can be downloaded by clicking on the session titles. The recordings are embedded below and can also be accessed via the PKI Consortium’s YouTube channel.
Policy Authority PKI Dutch Government (Logius)
Cryptographer at TNO
Lead Digital Policy Analyst at European Policy Centre (EPC)
Associate Professor at Eindhoven University of Technology
President & CEO at 01 Communique Laboratory Inc.
Senior Advisor Information Security at the Ministry of the Interior and Kingdom Relations (BZK) of the Netherlands
Cryptography Researcher at SAP
Research Engineer at Cloudflare
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Director, Alliances at Thales
Assistant Professor of Cryptology at NTNU Trondheim
Chief Security Officer at Keyfactor
Mathematician & Project Lead, Post-Quantum Cryptography at NIST
Research Engineer at SIDN Labs
Senior Cryptography Engineer at Fortanix
Senior Information Advisor at the Ministry of Infrastructure and Water Management of the Netherlands
Director of Product Management at Entrust
Vice President Product Development at Entrust
Cryptographer at Qualcomm
PhD researcher Delft University of Technology
Team lead at Deloitte
Head of Quantum at Banco Santander
Senior Product Architect at D-Trust
Researcher at Centrum Wiskunde & Informatica (CWI)
Regional VP, EMEA at PCI Security Standards Council
ANSSI
Researcher at NXP Semiconductors
The Federal Office for Information Security (BSI)
PhD Researcher at Delft University of Technology
Researcher at Centrum Wiskunde & Informatica (CWI) and Professor at Leiden University
Inspector, Dutch Authority for Digital Infrastructure
Quantum Safe Industry Lead at IBM
Tenured Researcher Cryptology at CWI
Board of Directors at Compumatica
Chair PKI Consortium and Director of Technology Compliance at Entrust
Global Vice President of Sales, Cryptographic Center of Excellence at Entrust
Head of the Cryptology Group at CWI
Staff Privacy Engineer at SandboxAQ
Assistant Professor at Digital Security Group, ICIS, Radboud University
Cryptographer at TNO
The Federal Office for Information Security (BSI)
Senior Scientist bij TNO en CWI
Global Lead, Quantum Security at Accenture
Chief PKI Officer at Keyfactor
Chapter Lead PQC at Utimaco
Albert de Ruiter - Policy Authority PKI Dutch Government (Logius)
Dustin Moody - Mathematician & Project Lead, Post-Quantum Cryptography at NIST
The U.S. National Institute of Standards and Technology (NIST) has been actively engaged in the solicitation, evaluation, and standardization of quantum-resistant public-key cryptographic algorithms. This year, in August, marked a significant milestone as NIST released a request for comments on the first three draft Federal Information Processing Standards (FIPS) for Post-Quantum Cryptography, following their successful completion of the initial four evaluation rounds.
In this presentation, Mr. Bill Newhouse and Dr. Dustin Moody from NIST will provide a comprehensive update, offering insights into the status of standardization, and the development of practices to ease migration from quantum-vulnerable public-key cryptography to quantum-resistant public-key cryptography.
Furthermore, in his Wednesday presentation, Dr. Dustin Moody will offer a more comprehensive examination of the standardization process for additional signature schemes. The first round of candidates was unveiled in July, and during his presentation, Dr. Moody will illuminate the various approaches taken and the feedback received since their initial announcement.
Preparing the United States for Post-Quantum Cryptography
Considering the rapidly evolving landscape in the realm of quantum computing and its potential implications for cybersecurity, this talk delves into the governance and regulatory framework surrounding Post-Quantum Cryptography in the United States.
The backdrop for this discussion is the enactment of HR 7535, known as the “Quantum Computing Cybersecurity Preparedness Act,” on December 21, 2022, by President Joe Biden. Among its many facets, this legislation underscores the critical role of cryptography in ensuring the national security of the United States and the continued functionality of its economy.
Mr. Bill Newhouse, will provide valuable insights into how the United States is proactively preparing both its federal government and a spectrum of organizations, with a particular focus on those supporting critical infrastructure, for the era of Post-Quantum Cryptography. This presentation highlights the collaborative efforts of key entities, including the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST), in shaping the governance and regulatory landscape that will govern Post-Quantum Cryptography within the nation.
Lattices are underlying three out of the four new PQC standards of the NIST: Kyber, Dilithium and Falcon. But what is a lattice? What kind of computation does it involves? What are the challenges related to implementing such schemes?
This talk aims at giving an overview at the principles of lattice-based cryptography, covering both public key encryption and digital signature.
* This is a 40 minute session
A quantum cybersecurity agenda for Europe
The rapid development of quantum computing creates a new set of challenges for European cybersecurity. In recent years, the European Union has pursued an ambitious cybersecurity agenda but nevertheless, there are still questions about the current framework’s fitness to respond to these new challenges. Particularly worrisome is the advent of quantum attacks on encryption that risk rendering current cryptographic systems obsolete as they are in use. In July 2023, the European Policy Centre, with the support of Quantum Delta NL, published a discussion paper in which it analyses the criticality of preparing for quantum attacks on encryption by the creation of a new quantum cybersecurity agenda that improves technical and political coordination between EU member states and EU bodies and institutions for the transition to post-quantum cryptography and the future use of other quantum-safe technologies.
The European Policy Centre (EPC) is an independent, not-for-profit think tank dedicated to fostering European integration through analysis and debate, supporting and challenging decision-makers at all levels to make informed decisions based on evidence and analysis, and providing a platform for engaging partners, stakeholders and citizens in EU policy-making and in the debate about the future of Europe.
Post-Quantum Policy and Roadmap of the BSI
In the point of view of the Federal Office for Information Security in Germany (BSI), the question of “if” or “when” there will be quantum computers is no longer paramount. First post-quantum algorithms have been selected by NIST for standardisation and post-quantum cryptography will be used by default. Therefore, the migration to post-quantum cryptography should be pushed forward.
In this presentation, the BSI will expound upon its post-quantum cryptography policy and roadmap. We will emphasize the significance of the migration to post-quantum algorithms in safeguarding critical digital infrastructure, data, and communications. The presentation will elucidate the BSI’s approach, outlining the trajectory of post-quantum cryptography adoption as the default cryptographic standard.
Stateful Hash-Based Signature Schemes
Stateful hash based signatures provide thorough security and a high level of maturity. However, their requirement of proper handling the state of the key raises concerns for certain use cases. In this talk we want to shade some light on the state handling challenge and how an ideal solution should look like to allow a smooth transition into the PQC era.
* This is a 40 minute session
ANSSI plan for post-quantum transition
Unlocking the Quantum-Resilient Cryptography Strategy for the Dutch central government
Germain van der Velden - Senior Information Advisor at the Ministry of Infrastructure and Water Management of the Netherlands
In this presentation, we will delve into the Dutch central governments’ approach to mitigate the risks of quantum technology. Quantum resilient Cryptography governance and regulation can help in mitigating these risks. Positioned at the forefront of quantum-resilient cryptography, a resource was crafted that extends beyond theoretical discussions, offering organizations concrete steps and invaluable advice. Because of our approach this will not only reach the government, but also IT-providers, and (vital) sectors in the Netherlands.
The commitment to fortifying global cybersecurity is exemplified by the Dutch PQC Migration Handbook. This indispensable resource equips organizations with pragmatic guidance on how to proactively mitigate the imminent threat posed by quantum computers to today’s cryptographic systems.
Join us to discover how the Dutch central government is diligently preparing for transition to quantum-resilient cryptographic solutions.
Last summer, several lattice-based schemes were chosen for standardization in NIST’s effort to standardize post-quantum cryptography. The process of selecting candidates is however not over, with the focus now being primarily on code-based and multivariate schemes. In this talk I will discuss code-based cryptosystems, their basic design principles, security and challenges. I will focus on the candidates remaining in the NIST competition - the well-established KEM designs, but also the new emerging signature designs.
* This is a 40 minute session
Ask the Experts: Global Perspectives on Post-Quantum Cryptography Governance
Andrea Garcia Rodriguez - Lead Digital Policy Analyst at European Policy Centre (EPC)
Stephan Ehlen - The Federal Office for Information Security (BSI)
Jérôme Plût - ANSSI
Anita Wehmann - Senior Advisor Information Security at the Ministry of the Interior and Kingdom Relations (BZK) of the Netherlands
Ronald Cramer Moderator - Head of the Cryptology Group at CWI
An engaging Q&A session on the global Governance and Regulation of Post-Quantum Cryptography. In this panel discussion, esteemed speakers from previous sessions will come together to answer your burning questions and provide a comprehensive overview of how various nations are addressing the impending quantum threat.
Discover how nations are navigating the intricate balance between innovation and security, and gain valuable insights into the diverse regulatory approaches that have emerged. Whether you’re interested in the regulatory intricacies of a specific region or seeking a broader understanding of global efforts, this Q&A session promises to offer a wealth of knowledge and expert perspectives on the Governance and Regulation of Post-Quantum Cryptography worldwide. Don’t miss this opportunity to engage with our panelists and explore the evolving landscape of quantum cybersecurity governance.
What is it going to take to break cryptography with a quantum computer?
The whole industry is working on standardizing and implementing post-quantum cryptography, in order to mitigate the risk from future quantum computers. One question that is (and will probably remain) unanswered is “when are quantum computers going to be powerful enough to break cryptography?”. At the same time, there are regular press releases about new methods of breaking cryptography in the short term. These publications often cause panic and confusion which is counter-productive to the process of mitigating the quantum risk.
In this presentation we give a high-level description on how quantum algorithms work, and what still needs to happen before such algorithms can be implemented on real hardware. A simple model can be used to make sense of past and future announcements on the nearing moment of the cryptopocalypse (the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack public-key cryptography). We discuss some of the examples from the past year.
LMS: Lighter, faster key generation
The Leighton-Micali Signature (LMS) system is a stateful hash-based signature scheme whose security relies on properties of hash functions, standing at a comfortable security level against attackers in possession of quantum computers. As such, LMS has been standardized by NIST in SP-800-208 and is regarded as a suitable post-quantum signature algorithm in industry.
At its core, generating an LMS private key and obtaining its corresponding public key involves computing an exponential number of hashes and eventually representing large Merkle trees in memory. Moreover, signing with this key later requires recovering subsets of the hashes computed at key generation time. Sequential, high memory approaches to these operations achieve best signature speed, but make LMS key generation prohibitively slow and resource-intensive. While there are a number of hardware-oriented efforts to optimize LMS, some open-source software implementations do not take advantage of known memory trade-offs and opt for small parameter sets.
In this talk, we describe how to make LMS key generation procedure faster with SIMD hashing (by adapting the low-memory iterative algorithm of RFC8554) and recall algorithms that trade off signature speed against succinct representations of private keys in memory.
Crunching the Numbers: Post Quantum Algorithm Performance
Machine-checking post-quantum cryptography
Comparing Strategies for Quantum-Safe Cryptography Adoption in Organizations
Leading the Quantum-safe Transition: A Growth Stages Approach
Birth of the Post-Quantum Internet
Update from the GSMA Post Quantum Telco Network Task Force
The GSMA Post Quantum Telco Network Task Force has been dedicated to exploring the implications of Post-Quantum Cryptography (PQC) within the telecommunications space. Our mission extends beyond theoretical discussions, focusing on the tangible impacts on Network Operators and the broader telco supply chain.
The task force is a collaborative effort involving more than 50 companies representing operators, government and the wider Telco supply chain, including over 20 major network operators globally.
Earlier this year, we published a comprehensive Post Quantum Telco Network Impact Assessment Whitepaper. Building on this groundwork, we are now actively developing Quantum Risk Management guidelines tailored specifically to the telecommunications industry. Additionally, we are crafting best practice guidelines that delve into Telco use cases, with a particular emphasis on Public Key Infrastructure (PKI) implications.
In this presentation, we will provide insights into our findings and ongoing initiatives, shedding light on the practical steps being taken to ensure the resilience and security of Telco networks in the age of quantum computing. Our comprehensive approach ensures that the telecommunications industry is well-prepared to face the security challenges and opportunities presented by the quantum era.
Post-quantum crypto integration for enterprise applications
Building Your PQC Lab: Trust But Verify Your PQC Ecosystem
Closing remarks for day 1
Albert de Ruiter - Policy Authority PKI Dutch Government (Logius)
Policy Authority PKI Dutch Government (Logius)
Cryptographer at TNO
Lead Digital Policy Analyst at European Policy Centre (EPC)
Associate Professor at Eindhoven University of Technology
President & CEO at 01 Communique Laboratory Inc.
Senior Advisor Information Security at the Ministry of the Interior and Kingdom Relations (BZK) of the Netherlands
Cryptography Researcher at SAP
Research Engineer at Cloudflare
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Director, Alliances at Thales
Assistant Professor of Cryptology at NTNU Trondheim
Chief Security Officer at Keyfactor
Mathematician & Project Lead, Post-Quantum Cryptography at NIST
Research Engineer at SIDN Labs
Senior Cryptography Engineer at Fortanix
Senior Information Advisor at the Ministry of Infrastructure and Water Management of the Netherlands
Director of Product Management at Entrust
Vice President Product Development at Entrust
Cryptographer at Qualcomm
PhD researcher Delft University of Technology
Team lead at Deloitte
Head of Quantum at Banco Santander
Senior Product Architect at D-Trust
Researcher at Centrum Wiskunde & Informatica (CWI)
Regional VP, EMEA at PCI Security Standards Council
ANSSI
Researcher at NXP Semiconductors
The Federal Office for Information Security (BSI)
PhD Researcher at Delft University of Technology
Researcher at Centrum Wiskunde & Informatica (CWI) and Professor at Leiden University
Inspector, Dutch Authority for Digital Infrastructure
Quantum Safe Industry Lead at IBM
Tenured Researcher Cryptology at CWI
Board of Directors at Compumatica
Chair PKI Consortium and Director of Technology Compliance at Entrust
Global Vice President of Sales, Cryptographic Center of Excellence at Entrust
Head of the Cryptology Group at CWI
Staff Privacy Engineer at SandboxAQ
Assistant Professor at Digital Security Group, ICIS, Radboud University
Cryptographer at TNO
The Federal Office for Information Security (BSI)
Senior Scientist bij TNO en CWI
Global Lead, Quantum Security at Accenture
Chief PKI Officer at Keyfactor
Chapter Lead PQC at Utimaco
Post-Quantum Crypto: Challenges for Embedded Applications
A testbed for evaluating post-quantum algorithms for the DNS
Challenges for the Post-Quantum Transition of Mobile Ecosystems
Coping with post-quantum signatures in the WebPKI
Hardware Cryptographic Modules
Giuseppe Damiano - Director of Product Management at Entrust
Volker Krummel - Chapter Lead PQC at Utimaco
Marc Stevens Moderator - Tenured Researcher Cryptology at CWI
[DISCUSSION] Your cryptography will be broken, prepare yourself now!
Germain van der Velden - Senior Information Advisor at the Ministry of Infrastructure and Water Management of the Netherlands
How to Sell Post-Quantum Readiness by Combining it with a Zero Trust Journey
Convincing the board of the urgency and importance of PQC can be challenging, especially when there are competing priorities and limited resources.
One possible way to sell PQC to the board is by combining it with a zero trust journey, which is a holistic approach to cybersecurity that assumes no trust in any entity, whether internal or external, and verifies every request and transaction. A zero trust journey can help organizations achieve better security outcomes, such as reducing the attack surface, enhancing visibility and control, and improving compliance and resilience. By aligning PQC with a zero trust journey, organizations can demonstrate how PQC can support and enable their strategic goals, such as digital transformation, innovation, and customer satisfaction.
In this presentation, we will discuss how to leverage the benefits of a zero trust journey to make a compelling case for PQC. We will also share some best practices and tips on how to plan and execute a successful PQC transition that is aligned with a zero trust journey.
A Sign of the Times: The Transition to Quantum Secure Authentication
Quantum-safe PKI for the German administration
The BSI is in control of the root certification authority of the public administration Public Key Infrastructure (PKI). This PKI is an essential element of the German government’s business processes at federal, state and municipal levels. For instance, subscribers of this PKI receive a signed certificate corresponding to a cryptographic key pair, which is used for identification, encryption, the creation of electronic signatures and other applications.
Currently, this PKI is based on RSA-4096. Hence, its security is threatened by the potential development of cryptographically relevant quantum computers. In order to address this threat, a full migration to a PKI based on quantum-safe cryptographic primitives has to be carried out.
Due to the variety of use-cases within this PKI, a number of technical requirements concerning performance, security and interoperability have to be taken into account in this migration. The goal of the talk is to discuss these requirements in detail and to present several concepts and possible solutions. In particular, we argue that a parallelized migration approach is essential in order to ensure constant availability of the system. Moreover, we discuss why standardized, stateful hash-based signature schemes such as XMSS or LMS are promising candidates for the root-CA-level in the PKI hierarchy.
Quantum Resistance through Symmetric Key Cryptography
PKI and PQC Strategy for Payment Card Industry
Symmetric Key Exchange: Lightweight Alternatives for a Post-Quantum IoT
Symmetric cryptographic primitives such as AES are simple, efficient and secure – even in a post-quantum world – which makes them interesting for a variation of purposes where we need secure encryption, but with strong constraints to computing power and storage. Traditionally a downside of these algorithms has been their static, long-term keys, making it hard to achieve security properties such as forward secrecy without negotiating a new key every time.
In this talk we will look at a number of protocols that achieve symmetric authenticated key exchange: we propose new methods of key evolution that guarantee full forward secrecy, while also taking care of key synchronization between the involved parties. This makes them very suitable for IoT devices, or other settings where efficient post-quantum cryptography is required.
Post-Quantum Cryptography & Trust Services
In the evolving landscape of cybersecurity, the emergence of quantum computing poses a substantial threat to the established foundations of trust services, particularly in the context of Qualified Trust Services governed by the eIDAS regulation. Join us for an insightful presentation by the Dutch Authority for Digital Infrastructure, the supervisory authority for Trust Service Providers in the Netherlands.
In this session, we will explore the intricate interplay between Post-Quantum Cryptography and Trust Services, shedding light on the unique challenges posed by the quantum threat. Discover how the eIDAS regulation, which governs Qualified Trust Services, faces significant implications in the quantum era. Gain valuable insights into the proactive strategies and regulatory considerations essential for maintaining trust and security in a quantum-affected landscape.
Join us to navigate the crucial intersection of Post-Quantum Cryptography and Trust Services, as we delve into the Dutch perspective and the broader implications for the global trust ecosystem.
Vulnerabilities of Blockchain Security in the World of Quantum Computing
NIST standardization of additional signature schemes
In this presentation, Dr. Dustin Moody, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
With the first round of additional signature scheme candidates announced in July, Dr. Moody will shed light on various approaches, including Code-based, Isogeny, Lattice-based, Multivariate, and others. He will also share insights into the feedback received since their initial announcement.
This session promises to provide valuable insights, expert analysis, and a comprehensive understanding of NIST’s ongoing mission to strengthen our digital future against the quantum threat.
Investigating Post-Quantum Cryptography: building a PQC decision tree for developers
Alessandro Amadori - Cryptographer at TNO
Now that the quantum era is upon us, the question arises: How do you ensure your organisation is “quantum-ready”? With some many candidates and standards to choose from, which algorithms are the right fit for your applications? Join this informative session to explore the development of a comprehensive decision tree by experts from various organizations, including dcypher, TNO, CWI, NXP, Compumatica, Technolution, and Fox-IT.
During this session, we’ll delve into the underlying motivations, thought processes and important takeaways regarding the creation of this decision tree. Gain insights into how to navigate the complexities of post-quantum cryptography and discover a practical tool designed to simplify the decision-making process for quantum-ready organisations.
Moving toward a Quantum Security Maturity Index
Recent advances in quantum computing, factoring algorithms, and hybrid compute approaches toward development of cryptographically relevant quantum computers have made the need to proactively defend our enterprises from this threat an immediate requirement.
Today there are a variety of approaches toward mitigating this risk that are being considered, developed, and deployed around the world. There are leading sectors and trailing sectors in terms of adoption, and there are different algorithms and architectures being relied on in various parts of the world. The constant message from government and industry is to ‘Start Now’ and while that is good, we need to consider what’s next.
With the variety of approaches and levels of maturity, there is a global move to agree upon a common maturity index that would support a common vocabulary, improve quantum defenses, consistently measure progress, share knowledge, and prioritize actions and budgets.
These maturity index levels would cover initial risk and strategy, discovery and inventory, crypto ecosystem, architectures, testing, trials, roll outs, and a steady state managed operation. Included in each of these levels would be reference to approaches such as CBOMs, crypto agility, quantum key distribution, algorithm selection, and more.
This talk will provide an introduction to the maturity index concept for quantum, an update on what else is happening around the world, and provide an invitation to participate in both the definitions, adoptions, and benefits of a globally accepted post quantum maturity index.
Using quantum-safe hybrid certificates for signing documents
CRQC and Signatures – no Problem?
Final Q&A
Albert de Ruiter Moderator - Policy Authority PKI Dutch Government (Logius)
As we wrap up this two-day conference, our experts will come together to address your queries, offer further insights, and engage in a meaningful exchange of ideas. Whether you seek to delve deeper into specific topics discussed during the conference or have broader inquiries about the quantum landscape, this session is your opportunity to connect with the experts who have shared their wisdom and expertise over the past two days.
Join us for a collaborative and enlightening Q&A session that tries to provide clarity, foster discussion, and leave you with a comprehensive understanding of the quantum computing and cryptography landscape. Don’t miss this final chance to engage with our speakers and conference chairs in a vibrant exchange of knowledge.
Recap: Unveiling Insights - A Two-Day Conference Retrospective
Greg Wetmore - Vice President Product Development at Entrust
Jelle Don - Researcher at Centrum Wiskunde & Informatica (CWI)
Marc Stevens - Tenured Researcher Cryptology at CWI
Ronald Cramer - Head of the Cryptology Group at CWI
Thomas Attema - Senior Scientist bij TNO en CWI
Tomas Gustavsson - Chief PKI Officer at Keyfactor
Paul van Brouwershaven Moderator - Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter Moderator - Policy Authority PKI Dutch Government (Logius)
As our two-day conference journey draws to a close, join us for a captivating recap session where our chairs will guide you through a comprehensive review of the insights, revelations, and pivotal moments that have unfolded throughout this event.
In this engaging retrospective, we will revisit the highlights, key takeaways, and thought-provoking discussions that have enriched our understanding of the quantum landscape. Our conference chairs will synthesize the wealth of knowledge shared by our esteemed presenters, encapsulating the essence of their presentations and the responses to your insightful questions.
This recap promises to be a valuable opportunity to distill the essence of this conference, offering a holistic perspective on the critical issues, emerging trends, and future directions in the field of quantum computing and cryptography.
Closing remarks
Albert de Ruiter - Policy Authority PKI Dutch Government (Logius)
This conference would not be possible without the organizational support of the Post-Quantum Cryptography Working Group and in particular the following organizations:
For more information on this conference, contact the PKI Consortium at [email protected]