Conference details
On November 7 and 8, 2023 the PKI Consortium will host their second hybrid Post-Quantum Cryptography (PQC) Conference in Amsterdam, the Netherlands.
The conference welcomes business leaders, industry experts, and representatives from various public and private sectors interested in PQC, offering a diverse program featuring keynote speeches, breakout sessions, panel discussions, and workshops.
The conference is open for anyone interested in preparing for Post-Quantum Cryptography and not limited to the members of the PKI Consortium.
Date and location
Date: November 7 and 8, 2023
Location: Meervaart, Amsterdam, the Netherlands
Registration: Click here
- This event can be attended in-person or remotely, we strongly recommend to attend in person where possible.
- There are no costs to register or attend the conference. Travel, accommodation and living expenses are not covered, all attendees are responsible to cover their own expenses.
Sponsors
We are immensely grateful to our sponsors:
Become a sponsor
Are you interested in becoming a sponsor for the Post-Quantum Cryptography Conference? For further details regarding sponsorship opportunities within the PKI Consortium and specifically for the PQC Conference, please reach out to us. You can also download the sponsorship brochure for comprehensive information and pricing of our sponsor packages.
Agenda
This is a preliminary agenda and is subject to revisions. The definitive details, including topics, abstracts, speakers, and allocated time slots, will be provided here once they are finalized.
Opening
Albert de Ruiter - Logius
Keynote Message
Status update from NIST
Dustin Moody - Mathematician & Project Lead, Post-Quantum Cryptography at NIST
The U.S. National Institute of Standards and Technology (NIST) has been actively engaged in the solicitation, evaluation, and standardization of quantum-resistant public-key cryptographic algorithms. This year, in August, marked a significant milestone as NIST released a request for comments on the first three draft Federal Information Processing Standards (FIPS) for Post-Quantum Cryptography, following their successful completion of the initial four evaluation rounds.
In this presentation, Mr. Bill Newhouse and Dr. Dustin Moody from NIST will provide a comprehensive update, offering insights into the status of standardization, and the development of practices to ease migration from quantum-vulnerable public-key cryptography to quantum-resistant public-key cryptography.
Furthermore, in his Wednesday presentation, Dr. Dustin Moody will offer a more comprehensive examination of the standardization process for additional signature schemes. The first round of candidates was unveiled in July, and during his presentation, Dr. Moody will illuminate the various approaches taken and the feedback received since their initial announcement.
Preparing the United States for Post-Quantum Cryptography
Considering the rapidly evolving landscape in the realm of quantum computing and its potential implications for cybersecurity, this talk delves into the governance and regulatory framework surrounding Post-Quantum Cryptography in the United States.
The backdrop for this discussion is the enactment of HR 7535, known as the “Quantum Computing Cybersecurity Preparedness Act,” on December 21, 2022, by President Joe Biden. Among its many facets, this legislation underscores the critical role of cryptography in ensuring the national security of the United States and the continued functionality of its economy.
Mr. Bill Newhouse, will provide valuable insights into how the United States is proactively preparing both its federal government and a spectrum of organizations, with a particular focus on those supporting critical infrastructure, for the era of Post-Quantum Cryptography. This presentation highlights the collaborative efforts of key entities, including the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST), in shaping the governance and regulatory landscape that will govern Post-Quantum Cryptography within the nation.
Lattice-based cryptography
The speaker(s) for this session will be announced soon!
* This is a 40 minute session
The EU Approach to Post-Quantum Cryptography Governance
As quantum computing revolutionizes the cybersecurity landscape, this session delves into the European perspective on governance and regulation in the era of Post-Quantum Cryptography.
In this presentation, we will discuss the EU approach to safeguarding critical digital infrastructure, data, and communications through the adoption of post-quantum cryptography as the default cryptographic standard. The session will offer insights into collaborative efforts across European nations and outline the roadmap for navigating the quantum future.
Post-Quantum Policy and Roadmap of the BSI
In the point of view of the Federal Office for Information Security in Germany (BSI), the question of “if” or “when” there will be quantum computers is no longer paramount. First post-quantum algorithms have been selected by NIST for standardisation and post-quantum cryptography will be used by default. Therefore, the migration to post-quantum cryptography should be pushed forward.
In this presentation, the BSI will expound upon its post-quantum cryptography policy and roadmap. We will emphasize the significance of the migration to post-quantum algorithms in safeguarding critical digital infrastructure, data, and communications. The presentation will elucidate the BSI’s approach, outlining the trajectory of post-quantum cryptography adoption as the default cryptographic standard.
Stateful Hash-Based Signature Schemes
Stateful hash based signatures provide thorough security and a high level of maturity. However, their requirement of proper handling the state of the key raises concerns for certain use cases. In this talk we want to shade some light on the state handling challenge and how an ideal solution should look like to allow a smooth transition into the PQC era.
* This is a 40 minute session
To be announced shortly
Unlocking the Netherlands' Quantum-Resilient Cryptography Strategy
Germain van der Velden - IT Advisor at the Ministry of Infrastructure and Water Management of the Netherlands
Larissa Kalle - Advisor Cybersecurity at the National Cyber Security Centre (NCSC) of the Netherlands
In this presentation, we will delve into the Netherlands’ approach to Post-Quantum Cryptography (PQC) governance and regulation. Positioned at the forefront of quantum-resilient cryptography, the Netherlands has crafted a resource that extends beyond theoretical discussions, offering organizations concrete steps and invaluable advice.
The Netherlands’ commitment to fortifying global cybersecurity is exemplified by the PQC Migration Handbook. This indispensable resource equips organizations with pragmatic guidance on how to proactively mitigate the imminent threat posed by quantum computers to today’s cryptographic systems.
Join us to discover how the Netherlands is diligently preparing both government entities and organizations to seamlessly transition to quantum-resilient cryptographic solutions.
To be announced shortly
The speaker(s) for this session will be announced soon!
* This is a 40 minute session
Ask the Experts: Global Perspectives on Post-Quantum Cryptography Governance
Stavros Kousidis - The Federal Office for Information Security (BSI)
An engaging Q&A session on the global Governance and Regulation of Post-Quantum Cryptography. In this panel discussion, esteemed speakers from previous sessions will come together to answer your burning questions and provide a comprehensive overview of how various nations are addressing the impending quantum threat.
Discover how nations are navigating the intricate balance between innovation and security, and gain valuable insights into the diverse regulatory approaches that have emerged. Whether you’re interested in the regulatory intricacies of a specific region or seeking a broader understanding of global efforts, this Q&A session promises to offer a wealth of knowledge and expert perspectives on the Governance and Regulation of Post-Quantum Cryptography worldwide. Don’t miss this opportunity to engage with our panelists and explore the evolving landscape of quantum cybersecurity governance.
A quantum cybersecurity agenda for Europe
The rapid development of quantum computing creates a new set of challenges for European cybersecurity. In recent years, the European Union has pursued an ambitious cybersecurity agenda but nevertheless, there are still questions about the current framework’s fitness to respond to these new challenges. Particularly worrisome is the advent of quantum attacks on encryption that risk rendering current cryptographic systems obsolete as they are in use. In July 2023, the European Policy Centre, with the support of Quantum Delta NL, published a discussion paper in which it analyses the criticality of preparing for quantum attacks on encryption by the creation of a new quantum cybersecurity agenda that improves technical and political coordination between EU member states and EU bodies and institutions for the transition to post-quantum cryptography and the future use of other quantum-safe technologies.
The European Policy Centre (EPC) is an independent, not-for-profit think tank dedicated to fostering European integration through analysis and debate, supporting and challenging decision-makers at all levels to make informed decisions based on evidence and analysis, and providing a platform for engaging partners, stakeholders and citizens in EU policy-making and in the debate about the future of Europe.
To be announced shortly
What is it going to take to break cryptography with a quantum computer?
The whole industry is working on standardizing and implementing post-quantum cryptography, in order to mitigate the risk from future quantum computers. One question that is (and will probably remain) unanswered is “when are quantum computers going to be powerful enough to break cryptography?”. At the same time, there are regular press releases about new methods of breaking cryptography in the short term. These publications often cause panic and confusion which is counter-productive to the process of mitigating the quantum risk.
In this presentation we give a high-level description on how quantum algorithms work, and what still needs to happen before such algorithms can be implemented on real hardware. A simple model can be used to make sense of past and future announcements on the nearing moment of the cryptopocalypse (the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack public-key cryptography). We discuss some of the examples from the past year.
Crunching the Numbers: Post Quantum Algorithm Performance
Comparing Strategies for Quantum-Safe Cryptography Adoption in Organizations
Protocol-independent interfaces for hybrid/multi-key signatures
The NIST PQC standardization has emerged in three FIPS drafts for quantum-safe KEM and Signatures. While the guidance on which PQC standards to adopt is getting clearer, many institutions like ANSSI and BSI recommend hybrid, or multi-key mechanisms for the transition to quantum-safe cryptography, typically combing a classical with a quantum-safe scheme to benefit from the security of both. The question how to perform multi-key exchange and multi-signature schemes (MKE/MSS) lead to several proposals for the integration in protocols like TLS, IPsec and X.509 certificates.
An implementer of a cryptographic protocol can usually rely on a cryptographic library to implement the primitives and algorithms such as for key exchange and authentication. In the case of MKE/MSS this is usually not the case, and it becomes the implementers task to combine multiple schemes. We argue that it is preferable to have a common abstraction for multi-key schemes in the core cryptographic library that can be used by different protocol stacks. To address this challenge, we propose a common software interface, which is usable for various protocol stacks. We focus on MSS and go through scenarios show how to integrate the interface.
Birth of the post-quantum Internet
Update from the GSMA Post Quantum Telco Network Task Force
The GSMA Post Quantum Telco Network Task Force has been dedicated to exploring the implications of Post-Quantum Cryptography (PQC) within the telecommunications space. Our mission extends beyond theoretical discussions, focusing on the tangible impacts on Network Operators and the broader telco supply chain.
The task force is a collaborative effort involving more than 50 companies representing operators, government and the wider Telco supply chain, including over 20 major network operators globally.
Earlier this year, we published a comprehensive Post Quantum Telco Network Impact Assessment Whitepaper. Building on this groundwork, we are now actively developing Quantum Risk Management guidelines tailored specifically to the telecommunications industry. Additionally, we are crafting best practice guidelines that delve into Telco use cases, with a particular emphasis on Public Key Infrastructure (PKI) implications.
In this presentation, we will provide insights into our findings and ongoing initiatives, shedding light on the practical steps being taken to ensure the resilience and security of Telco networks in the age of quantum computing. Our comprehensive approach ensures that the telecommunications industry is well-prepared to face the security challenges and opportunities presented by the quantum era.
Post-quantum crypto integration for enterprise applications
To be announced shortly
Closing remarks for day 1
Albert de Ruiter - Logius
Post-Quantum Crypto: Challenges for Embedded Applications
A testbed for evaluating post-quantum algorithms in DNS
To be announced shortly
Coping with post-quantum signatures in the WebPKI
Hardware Cryptographic Modules
Giuseppe Damiano - Director of Product Management at Entrust
Volker Krummel - Chapter Lead PQC at Utimaco
To be announced shortly
PKI deployments are as unique as any snowflake; how to build equally flexible PQ migration strategies
Machine-checking post-quantum cryptography
Quantum-safe PKI for the German administration
The BSI is in control of the root certification authority of the public administration Public Key Infrastructure (PKI). This PKI is an essential element of the German government’s business processes at federal, state and municipal levels. For instance, subscribers of this PKI receive a signed certificate corresponding to a cryptographic key pair, which is used for identification, encryption, the creation of electronic signatures and other applications.
Currently, this PKI is based on RSA-4096. Hence, its security is threatened by the potential development of cryptographically relevant quantum computers. In order to address this threat, a full migration to a PKI based on quantum-safe cryptographic primitives has to be carried out.
Due to the variety of use-cases within this PKI, a number of technical requirements concerning performance, security and interoperability have to be taken into account in this migration. The goal of the talk is to discuss these requirements in detail and to present several concepts and possible solutions. In particular, we argue that a parallelized migration approach is essential in order to ensure constant availability of the system. Moreover, we discuss why standardized, stateful hash-based signature schemes such as XMSS or LMS are promising candidates for the root-CA-level in the PKI hierarchy.
To be announced shortly
PKI and PQC Strategy for Payment Card Industry
To be announced shortly
Post-Quantum Cryptography & Trust Services
In the evolving landscape of cybersecurity, the emergence of quantum computing poses a substantial threat to the established foundations of trust services, particularly in the context of Qualified Trust Services governed by the eIDAS regulation. Join us for an insightful presentation by the Dutch Authority for Digital Infrastructure, the supervisory authority for Trust Service Providers in the Netherlands.
In this session, we will explore the intricate interplay between Post-Quantum Cryptography and Trust Services, shedding light on the unique challenges posed by the quantum threat. Discover how the eIDAS regulation, which governs Qualified Trust Services, faces significant implications in the quantum era. Gain valuable insights into the proactive strategies and regulatory considerations essential for maintaining trust and security in a quantum-affected landscape.
Join us to navigate the crucial intersection of Post-Quantum Cryptography and Trust Services, as we delve into the Dutch perspective and the broader implications for the global trust ecosystem.
Vulnerabilities of Blockchain Security in the World of Quantum Computing
NIST standardization of additional signature schemes
In this presentation, Dr. Dustin Moody, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
With the first round of additional signature scheme candidates announced in July, Dr. Moody will shed light on various approaches, including Code-based, Isogeny, Lattice-based, Multivariate, and others. He will also share insights into the feedback received since their initial announcement.
This session promises to provide valuable insights, expert analysis, and a comprehensive understanding of NIST’s ongoing mission to strengthen our digital future against the quantum threat.
Post-quantum technologies explained: building a PQ decision tree for developers
Now that the quantum era is upon us, the question arises: How do you ensure your project is “quantum ready”? Which algorithms are the right fit, and which protocols provide the necessary support? Join this informative session to explore the development of a comprehensive decision tree by experts from various organizations, including dcypher, TNO, CWI, NXP, Compumatica, Technolotion, and Fox-IT.
During this session, we’ll delve into the underlying motivations, careful considerations, and thought processes behind the creation of this decision tree. Gain insights into how to navigate the complexities of post-quantum cryptography and discover a practical tool designed to simplify the decision-making process for quantum-ready projects.
To be announced shortly
Using quantum-safe hybrid certificates for signing documents
To be announced shortly
CRQC and Signatures – no Problem?
Final Q&A
As we wrap up this two-day conference, our experts will come together to address your queries, offer further insights, and engage in a meaningful exchange of ideas. Whether you seek to delve deeper into specific topics discussed during the conference or have broader inquiries about the quantum landscape, this session is your opportunity to connect with the experts who have shared their wisdom and expertise over the past two days.
Join us for a collaborative and enlightening Q&A session that tries to provide clarity, foster discussion, and leave you with a comprehensive understanding of the quantum computing and cryptography landscape. Don’t miss this final chance to engage with our speakers and conference chairs in a vibrant exchange of knowledge.
Recap: Unveiling Insights - A Two-Day Conference Retrospective
As our two-day conference journey draws to a close, join us for a captivating recap session where our chairs will guide you through a comprehensive review of the insights, revelations, and pivotal moments that have unfolded throughout this event.
In this engaging retrospective, we will revisit the highlights, key takeaways, and thought-provoking discussions that have enriched our understanding of the quantum landscape. Our conference chairs will synthesize the wealth of knowledge shared by our esteemed presenters, encapsulating the essence of their presentations and the responses to your insightful questions.
This recap promises to be a valuable opportunity to distill the essence of this conference, offering a holistic perspective on the critical issues, emerging trends, and future directions in the field of quantum computing and cryptography.
Closing remarks
Albert de Ruiter - Logius
Speakers are prohibited from promoting their products or services at this conference. Commercials, workshops and pitches may contain commercial information.
This conference would not be possible without the organizational support of the Post-Quantum Cryptography Working Group and in particular the following organizations:

For more information on this conference, contact the PKI Consortium at [email protected]