January 15 and 16, 2025 - Austin, Texas, US | Online
Conference Details
The PKI Consortium hosted its third hybrid Post-Quantum Cryptography (PQC) Conference on Wednesday, January 15, and Thursday, January 16, 2025. The event took place at the Thompson Conference Center, University of Texas, Austin, Texas, US.
This conference was a premier gathering for decision-makers, technical leaders, and industry influencers from both public and private sectors who are deeply invested in the future of cryptography. Attendees experienced a diverse program featuring keynote speeches, breakout sessions, and panel discussions led by thought leaders in PQC.
The conference was open to all individuals interested in Post-Quantum Cryptography and was not limited to PKI Consortium members.
Sponsors
We are immensely grateful to our sponsors:
Titanium
Leader
Platinum
Gold
Innovator
Silver
Ambassador
Bronze
Agenda
The conference featured a balanced program with strategic, informational, and educational sessions in the Plenary room, and technical deep dives in the Breakout room. Attendees enjoyed keynote speeches, interactive sessions, and panel discussions led by Post-Quantum Cryptography (PQC) experts. To ensure a focus on education, speakers were not permitted to promote products or services during presentations.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO and is one a co-author of the second edition of the PQC migration handbook.
Alexander Löw
CEO at Data-Warehouse
Dr. Alexander Löw is the CEO of Data-Warehouse GmbH and serves as a Senator in the German Senate of Economy. He holds the position of Vice President of the German Cybersecurity Council Association and is the innovative mind behind IQIMS and PCert. With a deep understanding of cybersecurity since the 1980s and 25 years of experience as a Data Protection Officer (DPO), Alexander has a strong focus on Public Key Infrastructure (PKI). He has been involved in the conceptualization, building, and maintenance of industrial and governmental CAs (e.g., Macao, German Airforce, BMW) since 2001. In 2012, following a significant APT attack, he began automating PKI processes to enhance cybersecurity. Since 2014, he has been actively involved in publishing and presenting on PKI and cybersecurity topics, and has been conducting PKI trainings for the German BSI Alliance for Cybersecurity since 2015. In 2024, he joined the NIST Post-Quantum Migration Working Group to contribute to the development of standard 1800-38B.
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Andrew Regenscheid is the manager of the Cryptographic Technology Group within the Computer Security Division at NIST. In his 15 years at NIST, Andrew has worked to apply cryptographic algorithms and tools to improve the security of computer platforms, communication protocols, and authentication mechanisms. He currently leads NIST’s development of cryptographic standards and guidelines, which includes efforts on post-quantum cryptography, lightweight block ciphers and hash functions, and privacy-enhancing cryptography.
Axel York Poschmann
VP of Product at PQShield
Dr. Axel York Poschmann is a cryptography expert with over 15 years of experience, blending a strong academic foundation with industry leadership. Formerly an Assistant Professor at Nanyang Technological University, Axel’s research has led to high-impact publications and patents in cryptographic engineering. As VP of Product at PQShield, he drives the development of quantum-safe solutions, collaborating with regulators and industry leaders to advance secure communication systems.
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Bill Newhouse is a cybersecurity engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).
His work at the NCCoE, NIST’s applied cybersecurity lab, pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies provided by project collaborators. These projects include establishing communities of interest with members from industry, academia, and government to gain insight to define project’s that address cybersecurity risk faced by the members of the community of interest. NCCoE projects are documented in NIST SP 1800 series publications known as practices guides. He has completed guides addressing cybersecurity risk in the hospitality and retail sectors as well as an early demonstration of derived credentials. He recently completed a cybersecurity collaboration with the U.S. Department of Energy that resulted in a Cybersecurity Framework Profile developed for the Liquefied Natural Gas (LNG) industry and the subsidiary functions that support the overarching liquefaction process, transport, and distribution of LNG. His responsibilities as the financial services sector lead also include identifying ways to include financial services sector use case scenarios in relevant NCCoE projects/practice guides. He is presently leading projects on Data Classification and Migration to Post-Quantum Cryptography.
Blair Canavan
Director, Alliances - PQC Portfolio at Thales
Blair has 30+ years of cybersecurity sales, marketing and business development experience. Blair expanded his cybersecurity and cryptographic expertise with Symantec, several cyber start-ups including Chrysalis-ITS (Thales), Titus, Synopsys, InfoSec Global, Crypto4A and since September 2019, was recruited back to Thales’ Global Technology Alliances team, inclusive of the PKI & Post Quantum Cryptography (PQC) portfolio. He is an avid public speaker, start-up consultant and IT industry contributor. Blair holds an Hons.BA from the University of Waterloo and Wilfrid Laurier University, Ontario, Canada.
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Corey Bonnell
Technology Strategist at DigiCert
Corey Bonnell is a Technology Strategist at DigiCert. He has over 15 years of engineering experience in several domains with a deep focus on Public Key Infrastructure. Corey represents DigiCert in several standards organizations, such as the CA/Browser Forum, ETSI, and IETF. He has been involved in the standardization process of emerging standards relating to post-quantum cryptography and is a frequent participant in IETF post-quantum cryptography hackathons.
David Hook
VP Software Enginering at Keyfactor
David has been working on Cryptography APIs and secure protocols since the mid-1990s and in IT and open-source since the mid-1980s. He is a founder and still active committer of the Legion of the Bouncy Castle Cryptography project which began in the year 2000 and provides APIs in Java, C#, and Kotlin. David founded Crypto Workshop, now part of Keyfactor, in 2012 in order to better support the Bouncy Castle APIs and its user community. Shortly after, he led the work on the FIPS certification of the Bouncy Castle APIs, resulting in their first certifications in 2016. His deep interest is in providing tools to simplify the development of solutions that make use of cryptography and secure protocols, with an emphasis on standards-based approaches.
Ed Reynolds
Sr. Product Manager, HSM at Entrust
Ed Reynolds is a Product Manager for Hardware Security Modules in Entrust Digital Security Solutions. He has over 20 years of experience in cybersecurity, covering SSL/VPN, endpoint protection, DLP, data encryption technologies, key management, cryptographic modules and managed security services. Ed has been with Entrust since 2023, with prior positions in Thales CPL, Symantec’s Enterprise and Norton groups, along with software leadership positions in large OEMs. He is based in Austin, Texas.
Eric Amador
Product Manager at Thales
Eric Amador is Product Market Manager at Thales, spearheading the development of the Luna Hardware Security Module (HSM) product line. He leads diverse teams across engineering, sales, marketing, and support to deliver cutting-edge hardware security solutions.
Collaborating closely with R&D, Eric integrates emerging cryptographic technologies, including post-quantum cryptography (PQC), 5G, and crypto assets, to fortify product security. His role involves conducting in-depth market analysis to identify regional trends and customer needs across the Americas, Europe, APAC, and the Middle East. He fosters strategic partnerships with key industry players and ensures products adhere to stringent global and regional security standards, such as FIPS 140-3 Level 3 and Common Criteria EAL4+.
Erik Hieta-aho
Senior Scientist at VTT, Research Center of Finland
Erik Hieta-aho is a senior scientist in the applied cryptography research group at VTT, Finland’s research center. He received his PhD in mathematics at Ohio University in 2018 with a focus on error corrected coding theory. He has taken part in projects implementing a self-sovereign identity manager and studying the modern post-quantum cryptographic algorithms. He has interests in various contexts of PQC and the applications of cryptography.
Garfield Jones
Associate Chief of Strategic Technology at U.S. Department of Homeland Security
Garfield S. Jones is the Associate Chief of Strategic Technology for the Cybersecurity and Infrastructure Security Agency.
Dr. Jones is responsible for developing the strategy and providing guidance on the use of innovative and leading-edge technology across CISA, including articulating and documenting the future technology vision to achieve the organization’s mission objectives and goals.
Dr. Jones was Deputy Program Manager for the Continuous Diagnostics and Mitigation (CDM) Program responsible for Systems Engineering, Architecture, and Testing. Prior to joining DHS, Dr. Jones worked as a Systems Engineer developing complex weapons, geographic, and information systems for agencies such as Office of Naval Intelligence (ONI), National Geospatial Intelligence Agency (NGA), and the Naval Criminal Investigative Service (NCIS). In 2018, he retired from the Army Reserves after serving 25 years (16 years active duty and nine years reservist) as an Information Systems Warrant Officer.
Dr. Jones holds a Doctor of Engineering in Industrial and Systems Engineering with a concentration in Machine Learning and Artificial Intelligence. He serves as a professor at two universities teaching Computer Science and Systems Engineering. Dr. Jones filed for a patent regarding the use of the Probabilistic Neural Network (PNN) for Vulnerabilities Risk Calculation of a Text Document and he was granted the patent in 2023. He is currently working on a second patent.
Giuseppe Bruno
Head of Division at Bank of Italy
Giuseppe Bruno is the Head of Division in the Economics and Statistics Department at the Bank of Italy. In his career, he has worked with experts from the Division of Research and Statistics at the Board of Governors of the Federal Reserve System. In 1993, he spent an academic year at the University of Pennsylvania (Philadelphia) for developing algorithms for optimal control of econometric models. In 2000, after a short period at the Statistical Division of the Organisation for Economic Co-operation and Development (OECD), he was appointed Head of the Economic Research Department’s IT unit. In 2022 he has been visiting the Institute of Quantum Computing at the University of Waterloo. Over his career, he has published over 30 papers in different economic and computational economics journals.
Ini Kong
PhD Researcher at Delft University of Technology
Ini Kong is a PhD Researcher in the Department of Engineering Systems and Services at Delft University of Technology. Under the supervision of Prof.dr.ir. Marijn Janssen and Prof.dr.ir Nitesh Bharosa, her PhD research focuses on Public Key Infrastructure (PKI) systems that facilitate digital communication and information exchange. The aim of the research is to guide organizations transitioning toward Quantum-safe (QS) PKI systems and extend knowledge on the development of a stages-of-growth model for QS transition. Her PhD research is part of a larger project called HAPKIDO (Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organizations) funded by NWO (Netherlands Organization for Scientific Research). The project delivers sector-based plans towards QS PKIs, including hybrid PKIs that demonstrate how QS solutions will work with existing infrastructures, and governance models that guide organizations toward a QS future.
Iñigo Barreira
CA Manager at Sectigo
Iñigo Barreira has been working in PKI and cybersecurity for more than 25 years and has held technical responsibility positions on CAs/TSPs, Browsers and also Certification Bodies as an auditor. He started working with ETSI ESI in the earlies 2000 and has participated in several STFs developing many of the standards used in the past for the issuance of certificates and also on preservation services which were the germen for the current ENs in where he also participated as editor. He has also participated in some other projects with ENISA (European Agency for Cybersecurity) writing several reports, all related to PKI services. Iñigo is an engineer and holds several technical certifications.
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
Jaime Gómez García is a recognized expert in telecommunications, blockchain, and quantum technologies, with an extensive professional background within the financial sector. His contributions as a disseminator of quantum technologies and their consequential influence on enterprises, notably within the financial domain, have garnered him recognition as a LinkedIn Quantum Top Voices in 2022 and 2023. Currently, Jaime is Head of Quantum Technologies at Banco Santander, addressing how quantum computing can be leveraged in benefit of the business and how to tackle the quantum threat to cryptography.
Jan Klaußner
Senior Product Architect at Bundesdruckerei GmbH
Jan Klaußner studied computer science with focus on cryptography and security at TU Dresden and worked in the IT-Security industry ever since. Several years developing high grade security products provided him a deep understanding of the possibilities and challenges around smart cards and Public Key Infrastructures. Finally, he joined his team at the Bundesdruckerei in 2021 to improve and promote innovative ideas around PKIs and post quantum cryptography.
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Jeff Stapleton is a security professional with over 40 years’ experience primarily in the financial services industry, focusing on cryptography, PKI and key management. He has participated in the development of numerous ISO and X9 standards for 35 years, chaired the X9F4 Cybersecurity and Cryptography workgroup for 25 years, and a US expert to ISO TC68 Financial Services. Jeff has published papers, written articles, and authored his five-book series Security Without Obscurity with Routledge CRC Press.
John Buselli
Offering Manager at IBM Quantum
John Buselli is an Offering Manager for the IBM Quantum Group and is currently focused on the development and delivery of IBM’s Quantum Safe Program. In this role, he oversees product strategy, market development and customer-facing programs. Since joining IBM Research in 2015, John has focused on cyber security, confidential computing, privacy-enhancing technologies, data governance and securing AI Analytic initiatives.
He previously led a global team at IBM tasked with building an Information Governance/Compliance Practice within the IBM software organization. His career has been focused on establishing and expanding initial markets, products and operations for early-stage software firms including Verity (purchased by HP), and KVS (acquired by Symantec) Princeton Softech (purchased by IBM) as well as senior leadership roles at Seer Technologies and Texas Instruments.
Jonathan Smith
Senior FIPS Tester at DEKRA
Jonathan Smith has over 25 years experience testing FIPS modules and their algorithms across multiple NVLAP accredited CST laboratories; and frequently contributes to the cryptographic module user forum (CMUF)’s workgroups which develop proposed FIPS 140-3 guidance.
José Hernández Pérez
Research Specialist at HPI Consulting & Florida State University
José Hernández Pérez is an educational consultant specializing in emerging technologies for business, including artificial intelligence, quantum computing, and high-performance computing. He also works as an Applications Specialist at Florida State University’s Research Computing Center, focusing on curriculum development and providing research software support in the humanities, arts, and social sciences. His mission is to equip students at every career stage with the skills and resources they need to pursue their passions wherever they may lead them. José Hernández graduated from the University of Chicago with a MA in Digital Studies and a BA in History.
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Driven executive leader with over 20 years senior level global experience in digital transformation and telecommunications with a strong technology, strategy and innovation background (development, architecture, product and solution mgt) in Internet of Things, mobile networks, cloud, security, data analytics/ AI, edge. Expertise in building, integrating and delivering innovative digital products and solutions to market, across Private and Public sector within Enterprise.
Leading portfolio and industry efforts on application of Quantum Computing and Quantum Safe in Telecommunications in IBM.
Luke Valenta
Research Engineer at Cloudflare
Luke Valenta is a research engineer primarily focused on building secure, reliable systems and measuring the Internet.
He is broadly interested in computer security, network and protocol measurement, applied cryptography, privacy, elliptic curves, and distributed systems.
Mike Ounsworth
Software Security Architect at Entrust
Mike Ounsworth is a Software Security Architect at Entrust. His day-job is primarily application security architecture and penetration testing, with research projects in cryptography and post-quantum cryptography. He is leading discussion at IETF around post-quantum transition strategies for Public Key Infrastructure (PKI), including primary and secondary authorship on several Internet Drafts. He holds an M.Sc in Computer Science in robotics and artificial intelligence from McGill University, and an undergraduate degree in Computer Science with concentrations in mathematics and physics from Queen’s University. Fun fact: he has a decade of experience coaching the high school level FIRST Robotics Competition.
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
Mila Anastasova is an applied scientist at Amazon. She has received her PhD degree in Computer Engineering at Florida Atlantic University, in 2024. Her research is focused on the implementation and optimization of classical and post-quantum cryptography algorithms for different low- and high-end target platforms, as well as their integration into security network protocols.
Morgan Stern
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
Dr. Morgan Stern is the senior Quantum Resistant Cryptography Subject Matter Expert in the National Security Agency (NSA)’s Cybersecurity Directorate. In that capacity he combines his deep knowledge of public key cryptography and quantum information science to help craft cybersecurity strategy, and advise agencies across the US Government with regards to the threats and opportunities presented by quantum technologies. Prior to this he held a series of technical leadership roles in NSA’s Cybersecurity and Capabilities Directorates where he was responsible for analyzing the security of cryptographic systems, as well as serving joint duty at the Office of the Director for National Intelligence, providing analysis to policy makers.
Dr. Stern earned his PhD in Mathematics from the University of Maryland, College Park, and his BS in Mathematics from the University of Chicago.
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Panos has extensive experience with cyber security, applied cryptography, security automation, and vulnerability management. In his professional career, he has trained and presented on various security topics at technical events for numerous years. He has co-authored cybersecurity publications and participated in various security standards bodies to provide common interoperable protocols and languages for security information sharing, cryptography, and PKI. Currently, he works with engineers and industry standards partners to provide cryptographically secure tools, protocols, and standards.
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Paul van Brouwershaven is Director of Technology Compliance for Entrust’s certification authority, Chair of the PKI Consortium and former Vice Chair of the CA/Browser Forum.
Ralph Spencer Poore
Vice Chair of the PQC Working Group of the PKI Consortium
Ralph Spencer Poore is a seasoned technologist with over 50 years of experience in information assurance. He boasts a diverse background as an inventor, author, and instructor, specializing in computer security, information systems audit, applied cryptography, intellectual property, and computer forensics. Ralph serves as Vice Chair of the PQC Working Group of the PKI Consortium, actively contributing to the advancement of post-quantum cryptography.
Roman Cinkais
Co-founder at 3Key Company
Roman is the co-founder of 3Key Company, which provides services and products related to security in information technology. He has long been involved in public key infrastructure and the development of trust services such as certificate management, digital signature, and cryptographic key management. In 2021, he founded an open-source project called CZERTAINLY for trust service lifecycle management, which aims to help companies increase cryptographic agility and protect against external and internal cyber threats.
Samantha Mabey
Director of Digital Security Solutions Marketing at Entrust
Samantha Mabey is the Director of Digital Security Solutions Marketing at Entrust, where she oversees marketing strategy and communications for the data security and machine identity solutions, as well as leads the efforts around Zero Trust and Post Quantum. She acts as host of several acclaimed podcasts, including the Cybersecurity Institute Podcast, where she engages with industry experts on critical topics in cybersecurity, digital trust, and post quantum preparedness.
Combining her marketing acumen with a passion for digital security, Samantha is a recognized leader and influential voice in the industry.
Scott Aaronson
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
Scott Aaronson is a renowned theoretical computer scientist and the Schlumberger Centennial Chair of Computer Science at the University of Texas at Austin. His pioneering contributions to quantum computing and computational complexity theory include influential work on the Quantum Turing Machine with postselection, algebrization, and boson sampling.
Aaronson received his B.Sc. in Computer Science from Cornell University and his Ph.D. from the University of California, Berkeley, under the mentorship of Umesh Vazirani. His career includes notable roles at the Institute for Advanced Study, the University of Waterloo, and MIT. He is also the founding director of UT Austin’s Quantum Information Center, a leading hub for advancing quantum research and technology.
His achievements have been recognized with prestigious awards, including the Alan T. Waterman Award, the Presidential Early Career Award for Scientists and Engineers (PECASE), the Tomassoni–Chisesi Prize, and the ACM Prize in Computing. Aaronson is also well known for his blog, Shtetl-Optimized, and his book, Quantum Computing Since Democritus, which make complex scientific concepts accessible to a wide audience.
Scott Stuewe
President and CEO at DirectTrust
Scott Stuewe is a 25+ year veteran of the healthcare information technology industry. As President and CEO of DirectTrust, Scott drives strategy, visibility, and growth of DirectTrust’s focus areas of community, accreditation, standards development, and trust services to contribute to the advancement of trusted healthcare data exchange. Under his tenure, the organization achieved the landmark milestones of one, two, three, and four billion Direct Secure Messages sent and received through the DirectTrust Network, as well as acquired SAFE Identity, and merged with EHNAC. Previously, Stuewe was Director of Strategy and Interoperability at a health information management company, and served more than 24 years at Cerner, including as Cerner Network’s Director of National Interoperability Strategy, where he drove participation in the CommonWell Health Alliance and the bridge with Carequality.
Syed Suleman Ahmad
Research Engineer at Cloudflare
Suleman is a Research Engineer working at the intersection of product engineering and security research at Cloudflare. His work and academic experience has span the following areas of interest: Security and Privacy, Internet Measurement, and Applied Machine Learning — particularly applications in Cybersecurity, and Distributed Systems.
Tim Callan
Chief Compliance Officer at Sectigo
Tim Callan has over 20 years of experience in the SSL and PKI technology spaces. Tim leads Sectigo’s conformance with industry and regulatory requirements including browser root programs, WebTrust, CA/Browser Forum, and more. Tim is instrumental in driving initiatives to improve certificate agility and successful issuance. A founding member of the CA/Browser Forum and current vice-chair for one of its working groups, Tim is creator and co-host of “Root Causes: A PKI and Security Podcast”, the world’s most popular podcast dedicated to digital certificates. With 400+ episodes published, Tim is on the forefront of explaining trends that will be essential to the IT professionals, including shortening certificate lifespans and the coming change to post-quantum cryptography.
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas is the founder of the open-source PKI project EJBCA and Chief PKI Officer of Keyfactor. He has been implementing PKI systems since 1994 and have contributed to numerous other open source-projects in PKI and applied cryptography. Tomas has been working on applying quantum safe algorithms to PKI for the last couple of years.
Yarkin Doroz
Product Manager at NVIDIA
Yarkin Doroz is a product manager for Encryption Libraries on the NVIDIA Enterprise product team. He ensures the development of cutting-edge encryption solutions to keep Nvidia’s products at the forefront of security technology. Prior to joining NVIDIA, Yarkin co-founded two startups and served as a teaching professor at Worcester Polytechnic Institute (WPI). His expertise includes Post-Quantum Cryptography, Fully Homomorphic Encryption, and Side-Channel Attacks.
8:30
Registration
9:00
Plenary
Opening
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
9:30
Plenary
Quantum Computing: Between Hope and Hype
Scott Aaronson
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
Professor Aaronson will provide a personal perspective on the current state and future prospects of quantum computing, addressing its implications for cryptography and the pressing question of how long current public-key cryptographic systems might remain secure. Following his talk, Professor Aaronson will engage in an open Q&A session, inviting discussion on any aspects of quantum computing.
10:00
Plenary
NIST Post-Quantum Cryptography Update
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
In August 2024, the National Institute of Standards and Technology (NIST) reached a pivotal moment by releasing the first three finalized Post-Quantum Cryptography (PQC) standards: FIPS 203, FIPS 204, and FIPS 205. These standards mark the beginning of a new era in cryptography, designed to protect against the future threat of quantum computing.
In this presentation, Mr. Andrew Regenscheid, Manager Cryptographic Technology Group at NIST, will provide an in-depth update on the newly established FIPS PQC standards. He will also discuss the ongoing efforts to standardize additional cryptographic algorithms, ensuring preparedness for potential vulnerabilities in the current standards.
Mr. Bill Newhouse, a cybersecurity engineer and Project Lead at the NIST National Cybersecurity Center of Excellence (NCCoE), will explain the urgency of transitioning to these new quantum-resistant cryptographic standards. He will also share practical strategies and best practices to facilitate the migration from existing public-key cryptographic systems to these next-generation standards.
11:00
Break
11:30
Plenary
Transitioning National Security Systems to a Post Quantum Future
Morgan Stern
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
In this presentation, Dr. Morgan Stern, Senior Subject Matter Expert on Quantum-Resistant Cryptography within the National Security Agency (NSA)’s Cybersecurity Directorate, will discuss the NSA’s approach to transitioning National Security Systems to a post-quantum future. Dr. Stern will highlight key strategies, challenges, and milestones in preparing for the quantum threat, ensuring secure and resilient systems for national defense.
Breakout
Migrating and benchmarking a banking application
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
There is a hesitance to start the migration to quantum-safe solutions, which leads to slower adoption of PQC. This stems from multiple PQC algorithms to choose from, each having specific strong and weaker points, especially with respect to performance, storage and bandwidth. How to deploy these? Hybrid or not? What is the impact on my application? By helping (financial) organisation in migrating their application and testing them in an operational setting, we capture system effects and benchmarking results. In this presentation, I will discuss the results and experiences gained during the migration and share common pitfalls.
12:00
Plenary
ELI5: Implementing Digital Certificates for a Post-Quantum World
Tim Callan
Chief Compliance Officer at Sectigo
This presentation will focus on the pragmatic steps IT teams can take now to prepare for deployment of post-quantum cryptographic algorithms once it becomes practical. This conversation will directly connect the steps back to IT teams’ day-to-day tasks, as it relates to certificate management, and help practitioners identify exactly what they need to do today to begin the process of being post-quantum ready. The presentation will go over: (1) the necessary steps for industry standards bodies to clarify requirements for the new NIST standards; (2) what software, hardware, and services vendors need to do to incorporate support and possible timelines for this support; (3) how enterprises can apply these updates, (4) what you, as an IT manager, can do today to begin the transformation to PQC, and (5) what a likely post-quantum certificate migration plan might look like, including the use of hybrid certificates.
Breakout
Architecting PKI Hierarchies for Graceful PQ Migration
Mike Ounsworth
Software Security Architect at Entrust
Public Key Infrastructures (PKIs) are intricate systems to design, deploy, and maintain. As post-quantum cryptography (PQC) becomes a reality, one of the most challenging decisions will be algorithm selection. Historically, this has been straightforward—for example, using RSA-2048-SHA256 consistently throughout the PKI hierarchy. In a PQC world, this approach becomes less viable due to tradeoffs that may require different algorithms or parameters at each layer. For instance, long-term secure algorithms might be optimal for root CAs, high-performance algorithms for issuing CAs, and bandwidth-efficient algorithms for end entities.
Hybrid approaches further complicate these decisions, offering additional security or migration flexibility depending on the use case. This talk explores a “toolbox” of migration mechanisms for X.509 and presents example PKI hierarchies tailored to specific scenarios, illustrating how to navigate the complexity of algorithm choices for a graceful transition to post-quantum cryptography.
12:30
Plenary
Strategies for Transitioning to Future-Proof Cryptography
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
Scott Stuewe
President and CEO at DirectTrust
Samantha MabeyModerator
Director of Digital Security Solutions Marketing at Entrust
This panel will bring together industry leaders from the Financial, Mobile, and Healthcare sectors to discuss the critical transition to post-quantum cryptography (PQC). Panelists from leading banks, the GSMA Association, DirectTrust, and other key stakeholders will explore the growing threat posed by quantum computing to traditional cryptographic systems. They will discuss the unique challenges each industry faces in adopting quantum-resistant solutions, including technical, regulatory, and operational hurdles. Key topics will include the current state of readiness, strategies for smooth transitions, the role of standards bodies, and collaborative efforts across industries. The discussion will also address timelines, cost considerations, and the importance of future-proofing critical infrastructure to ensure security in a post-quantum world.
Breakout
Update on end-to-end PKI and HSM integrations with ML-DSA
Tomas Gustavsson
Chief PKI Officer at Keyfactor
At last years PQC Conference we benchmarked Hardware Securtiy Modules with Dilithium. Now that FIPS-204 is released, it is time to forget about Dilithium and do production level integrations using ML-DSA.
This session shows PKI application integration for issuing certificates, with a number of HSMs that are ready for ML-DSA. We will highlight how easy, or hard, it is to integrate using PKCS#11 or REST APIs. Of course there will be benchmarks of certificate issuance comparing ML-DSA against classic algorithms. Let’s see what else we are able to squeeze in until January.
13:00
Lunch
14:00
Plenary
2025 is Here - How to get your PQC Readiness Plan Underway
Blair Canavan
Director, Alliances - PQC Portfolio at Thales
2024 saw NIST’s milestone release of the first certified PQC algorithms. As 2025 begins, it is more urgent than ever to “get your house in order” with Quantum Readiness. We will discuss these current & future risks and outline how to effectively counter against evolving threats with strategic and tactical steps within a PQC readiness plan. This session will also identify some of the industry challenges affecting today’s PKI, IoT, TLS & Code Signing. To conclude, strategies will be presented citing real-world examples including PQC code signing that specifically describe ecosystem collaboration and testing within critical enterprise applications and infrastructure.
Breakout
Online Quantum-safe Readiness Tool
Ini Kong
PhD Researcher at Delft University of Technology
The list of standardization based on Post-Quantum Cryptography (PQC) and the NIST IR 8547 initial public draft signal that organizations should begin preparing for their transitions to PQC standards. While transitions to PQC standards cannot be addressed in isolation due to interdependencies that organizations depend on, there are many uncertainties that prevent organizations from taking actionable steps. In order to navigate the complexities of transitions, an online quantum readiness assessment tool is developed to guide organizations. With a multi-dimensional approach, the tool recognizes various dimensions that organizations should consider when transitioning their existing infrastructures. What sets this tool apart from other available tool is its foundation in the scientific methods, utilizing empirical data and addressing context specific transition challenges relevant to PKIs. Since it remains crucial for organizations to gain an overview of transition progress, the tool allows organizations to focus on areas that have low readiness levels and adjust their strategies with a set of possible recommendations.
14:30
Plenary
X9 Financial PKI: PQC Readiness and Crypto-Agility for Financial Services
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Transitioning from legacy asymmetric algorithms to PQC algorithms also means upgrading your PKI and certificates, however the financial services industry has its own needs which no longer aligns with the CA/Browser Forum, the IETF, NIST, or other programs. Consequently, the Accredited Standards Committee (ASC) X9 Financial Services has launched the X9 Financial PKI as an alternative for PQC readiness and crypto-agility to banks, merchants, and third-party financial service providers. This session discusses the issues, the requirements, the technologies, the X9 Financial PKI program, and its first implementation using PQC enabled certificates.
Secure e-mail communication is a natural fit for hybrid cryptography, offering long-term confidentiality and non-repudiation for users. This talk introduces a prototype system comprising a Certificate Authority, Certificate Management System, and an extended Open Source client application, including an integration module for Microsoft Outlook.
The presentation explores the selection criteria for hybrid schemes and the rationale behind choosing Composite and ICA approaches to facilitate PKI and S/MIME migration. It also shares insights from implementing and using pure PQC, Composite, and ICA hybrid constructions. Topics include certificate creation, client enrollment, and securely signing and encrypting e-mail messages using S/MIME across various cryptographic configurations, emphasizing the hybrid integration of classical and post-quantum secure cryptography.
15:00
Plenary
Why the Internet isn’t ready for Post-Quantum Certificates
Luke Valenta
Research Engineer at Cloudflare
NIST has finalized the first set of post-quantum algorithms, and post-quantum key agreement has been enabled by default in browsers for over a year. Why are signatures lagging behind? This talk provides the latest updates in a fast-moving ecosystem, a recap of the challenges in migrating to post-quantum certificates, and an overview of ongoing efforts to make post-quantum signatures practical in the WebPKI.
In a followup breakout session, we go into detail into some of the more promising proposals for coping with post-quantum certificates.
Breakout
Quantum-Safe Secure Boot: How hard can it be?
Axel York Poschmann
VP of Product at PQShield
Secure boot is hard. Quantum-safe secure boot is even harder. It starts with the choice of a suitable algorithm. On the signature verification side, conflicting regulatory requirements on Post-Quantum/Traditional (PQ/T) hybrid mean there is no silver-bullet, while on the signature generation side, key management challenges and the lack of available end-to-end quantum-safe solutions further complicate the decision process.
In this talk we highlight open issues at various stages of the secure boot lifecycle.
15:30
Break
16:00
Plenary
Extending or Evolving: Choosing the Path to Quantum Readiness
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
This panel will delve deeper into the decisions organizations face in securing their systems for the post-quantum era. Should resources be directed toward extending the life of legacy algorithms—such as by increasing RSA key sizes or adopting higher-order elliptic curves—to address immediate security concerns? Or is it more prudent to focus exclusively on transitioning to quantum-resistant algorithms? This session will explore the technical and strategic trade-offs of both approaches, offering insights into the urgency and complexity of achieving quantum readiness.
Breakout
Making PQ Signatures work in the WebPKI
Luke Valenta
Research Engineer at Cloudflare
Post-quantum signatures are not easily deployable in the WebPKI. Using the signature algorithms recently standardized by NIST as drop-in replacements for existing classical algorithms on the Web would incur significant performance degradations, making this approach infeasible unless a cryptographically-relevant quantum computer (CRQCs) is imminent. There’s a real risk that post-quantum signatures do not see widespread adoption before CRQCs become a reality, unless we make changes to how signatures are used in the WebPKI.
This talk dives into several of the more promising proposals for making post-quantum signatures deployable, from TLS extensions to reduce the number of transmitted signatures, to using key agreement as an authentication mechanism, to complete overhauls of the WebPKI. We discuss ongoing work to evaluate the feasibility of each of these proposals and to address known unknowns.
(this is a 60 minute session)
16:30
Plenary
To Hybrid or Not to Hybrid: Navigating the PQC Transition
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Garfield Jones
Associate Chief of Strategic Technology at U.S. Department of Homeland Security
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
As organizations prepare for the post-quantum era, hybrid cryptography has emerged as a contentious strategy. Advocates see it as a pragmatic bridge, combining classical algorithms with quantum-resistant counterparts—or even multiple quantum-resistant algorithms—to ensure security during the transition. Critics, however, argue that hybrid solutions introduce complexity, increase attack surfaces, and may delay full adoption of streamlined quantum-safe algorithms.
This panel brings together experts with diverse perspectives to debate the merits and drawbacks of hybrid cryptography. Should hybrid solutions be embraced as a stepping stone, or do they risk complicating the path to quantum readiness? Attendees will explore the technical, operational, and strategic implications of hybrid approaches, including the potential benefits and challenges of combining multiple quantum-resistant algorithms.
Breakout
Continuation of prior session
16:55
Plenary
Closing remarks for day 1
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:00
Networking
19:00
End of Day One
8:30
Registration
9:00
Opening
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
9:30
Quantum Computing: Between Hope and Hype
Scott Aaronson
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
Professor Aaronson will provide a personal perspective on the current state and future prospects of quantum computing, addressing its implications for cryptography and the pressing question of how long current public-key cryptographic systems might remain secure. Following his talk, Professor Aaronson will engage in an open Q&A session, inviting discussion on any aspects of quantum computing.
10:00
NIST Post-Quantum Cryptography Update
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
In August 2024, the National Institute of Standards and Technology (NIST) reached a pivotal moment by releasing the first three finalized Post-Quantum Cryptography (PQC) standards: FIPS 203, FIPS 204, and FIPS 205. These standards mark the beginning of a new era in cryptography, designed to protect against the future threat of quantum computing.
In this presentation, Mr. Andrew Regenscheid, Manager Cryptographic Technology Group at NIST, will provide an in-depth update on the newly established FIPS PQC standards. He will also discuss the ongoing efforts to standardize additional cryptographic algorithms, ensuring preparedness for potential vulnerabilities in the current standards.
Mr. Bill Newhouse, a cybersecurity engineer and Project Lead at the NIST National Cybersecurity Center of Excellence (NCCoE), will explain the urgency of transitioning to these new quantum-resistant cryptographic standards. He will also share practical strategies and best practices to facilitate the migration from existing public-key cryptographic systems to these next-generation standards.
11:00
Break
11:30
Transitioning National Security Systems to a Post Quantum Future
Morgan Stern
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
In this presentation, Dr. Morgan Stern, Senior Subject Matter Expert on Quantum-Resistant Cryptography within the National Security Agency (NSA)’s Cybersecurity Directorate, will discuss the NSA’s approach to transitioning National Security Systems to a post-quantum future. Dr. Stern will highlight key strategies, challenges, and milestones in preparing for the quantum threat, ensuring secure and resilient systems for national defense.
Migrating and benchmarking a banking application
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
There is a hesitance to start the migration to quantum-safe solutions, which leads to slower adoption of PQC. This stems from multiple PQC algorithms to choose from, each having specific strong and weaker points, especially with respect to performance, storage and bandwidth. How to deploy these? Hybrid or not? What is the impact on my application? By helping (financial) organisation in migrating their application and testing them in an operational setting, we capture system effects and benchmarking results. In this presentation, I will discuss the results and experiences gained during the migration and share common pitfalls.
12:00
ELI5: Implementing Digital Certificates for a Post-Quantum World
Tim Callan
Chief Compliance Officer at Sectigo
This presentation will focus on the pragmatic steps IT teams can take now to prepare for deployment of post-quantum cryptographic algorithms once it becomes practical. This conversation will directly connect the steps back to IT teams’ day-to-day tasks, as it relates to certificate management, and help practitioners identify exactly what they need to do today to begin the process of being post-quantum ready. The presentation will go over: (1) the necessary steps for industry standards bodies to clarify requirements for the new NIST standards; (2) what software, hardware, and services vendors need to do to incorporate support and possible timelines for this support; (3) how enterprises can apply these updates, (4) what you, as an IT manager, can do today to begin the transformation to PQC, and (5) what a likely post-quantum certificate migration plan might look like, including the use of hybrid certificates.
Architecting PKI Hierarchies for Graceful PQ Migration
Mike Ounsworth
Software Security Architect at Entrust
Public Key Infrastructures (PKIs) are intricate systems to design, deploy, and maintain. As post-quantum cryptography (PQC) becomes a reality, one of the most challenging decisions will be algorithm selection. Historically, this has been straightforward—for example, using RSA-2048-SHA256 consistently throughout the PKI hierarchy. In a PQC world, this approach becomes less viable due to tradeoffs that may require different algorithms or parameters at each layer. For instance, long-term secure algorithms might be optimal for root CAs, high-performance algorithms for issuing CAs, and bandwidth-efficient algorithms for end entities.
Hybrid approaches further complicate these decisions, offering additional security or migration flexibility depending on the use case. This talk explores a “toolbox” of migration mechanisms for X.509 and presents example PKI hierarchies tailored to specific scenarios, illustrating how to navigate the complexity of algorithm choices for a graceful transition to post-quantum cryptography.
12:30
Strategies for Transitioning to Future-Proof Cryptography
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
Scott Stuewe
President and CEO at DirectTrust
Samantha MabeyModerator
Director of Digital Security Solutions Marketing at Entrust
This panel will bring together industry leaders from the Financial, Mobile, and Healthcare sectors to discuss the critical transition to post-quantum cryptography (PQC). Panelists from leading banks, the GSMA Association, DirectTrust, and other key stakeholders will explore the growing threat posed by quantum computing to traditional cryptographic systems. They will discuss the unique challenges each industry faces in adopting quantum-resistant solutions, including technical, regulatory, and operational hurdles. Key topics will include the current state of readiness, strategies for smooth transitions, the role of standards bodies, and collaborative efforts across industries. The discussion will also address timelines, cost considerations, and the importance of future-proofing critical infrastructure to ensure security in a post-quantum world.
Update on end-to-end PKI and HSM integrations with ML-DSA
Tomas Gustavsson
Chief PKI Officer at Keyfactor
At last years PQC Conference we benchmarked Hardware Securtiy Modules with Dilithium. Now that FIPS-204 is released, it is time to forget about Dilithium and do production level integrations using ML-DSA.
This session shows PKI application integration for issuing certificates, with a number of HSMs that are ready for ML-DSA. We will highlight how easy, or hard, it is to integrate using PKCS#11 or REST APIs. Of course there will be benchmarks of certificate issuance comparing ML-DSA against classic algorithms. Let’s see what else we are able to squeeze in until January.
13:00
Lunch
14:00
2025 is Here - How to get your PQC Readiness Plan Underway
Blair Canavan
Director, Alliances - PQC Portfolio at Thales
2024 saw NIST’s milestone release of the first certified PQC algorithms. As 2025 begins, it is more urgent than ever to “get your house in order” with Quantum Readiness. We will discuss these current & future risks and outline how to effectively counter against evolving threats with strategic and tactical steps within a PQC readiness plan. This session will also identify some of the industry challenges affecting today’s PKI, IoT, TLS & Code Signing. To conclude, strategies will be presented citing real-world examples including PQC code signing that specifically describe ecosystem collaboration and testing within critical enterprise applications and infrastructure.
Online Quantum-safe Readiness Tool
Ini Kong
PhD Researcher at Delft University of Technology
The list of standardization based on Post-Quantum Cryptography (PQC) and the NIST IR 8547 initial public draft signal that organizations should begin preparing for their transitions to PQC standards. While transitions to PQC standards cannot be addressed in isolation due to interdependencies that organizations depend on, there are many uncertainties that prevent organizations from taking actionable steps. In order to navigate the complexities of transitions, an online quantum readiness assessment tool is developed to guide organizations. With a multi-dimensional approach, the tool recognizes various dimensions that organizations should consider when transitioning their existing infrastructures. What sets this tool apart from other available tool is its foundation in the scientific methods, utilizing empirical data and addressing context specific transition challenges relevant to PKIs. Since it remains crucial for organizations to gain an overview of transition progress, the tool allows organizations to focus on areas that have low readiness levels and adjust their strategies with a set of possible recommendations.
14:30
X9 Financial PKI: PQC Readiness and Crypto-Agility for Financial Services
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Transitioning from legacy asymmetric algorithms to PQC algorithms also means upgrading your PKI and certificates, however the financial services industry has its own needs which no longer aligns with the CA/Browser Forum, the IETF, NIST, or other programs. Consequently, the Accredited Standards Committee (ASC) X9 Financial Services has launched the X9 Financial PKI as an alternative for PQC readiness and crypto-agility to banks, merchants, and third-party financial service providers. This session discusses the issues, the requirements, the technologies, the X9 Financial PKI program, and its first implementation using PQC enabled certificates.
Secure e-mail communication is a natural fit for hybrid cryptography, offering long-term confidentiality and non-repudiation for users. This talk introduces a prototype system comprising a Certificate Authority, Certificate Management System, and an extended Open Source client application, including an integration module for Microsoft Outlook.
The presentation explores the selection criteria for hybrid schemes and the rationale behind choosing Composite and ICA approaches to facilitate PKI and S/MIME migration. It also shares insights from implementing and using pure PQC, Composite, and ICA hybrid constructions. Topics include certificate creation, client enrollment, and securely signing and encrypting e-mail messages using S/MIME across various cryptographic configurations, emphasizing the hybrid integration of classical and post-quantum secure cryptography.
15:00
Why the Internet isn’t ready for Post-Quantum Certificates
Luke Valenta
Research Engineer at Cloudflare
NIST has finalized the first set of post-quantum algorithms, and post-quantum key agreement has been enabled by default in browsers for over a year. Why are signatures lagging behind? This talk provides the latest updates in a fast-moving ecosystem, a recap of the challenges in migrating to post-quantum certificates, and an overview of ongoing efforts to make post-quantum signatures practical in the WebPKI.
In a followup breakout session, we go into detail into some of the more promising proposals for coping with post-quantum certificates.
Quantum-Safe Secure Boot: How hard can it be?
Axel York Poschmann
VP of Product at PQShield
Secure boot is hard. Quantum-safe secure boot is even harder. It starts with the choice of a suitable algorithm. On the signature verification side, conflicting regulatory requirements on Post-Quantum/Traditional (PQ/T) hybrid mean there is no silver-bullet, while on the signature generation side, key management challenges and the lack of available end-to-end quantum-safe solutions further complicate the decision process.
In this talk we highlight open issues at various stages of the secure boot lifecycle.
15:30
Break
16:00
Extending or Evolving: Choosing the Path to Quantum Readiness
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
This panel will delve deeper into the decisions organizations face in securing their systems for the post-quantum era. Should resources be directed toward extending the life of legacy algorithms—such as by increasing RSA key sizes or adopting higher-order elliptic curves—to address immediate security concerns? Or is it more prudent to focus exclusively on transitioning to quantum-resistant algorithms? This session will explore the technical and strategic trade-offs of both approaches, offering insights into the urgency and complexity of achieving quantum readiness.
Making PQ Signatures work in the WebPKI
Luke Valenta
Research Engineer at Cloudflare
Post-quantum signatures are not easily deployable in the WebPKI. Using the signature algorithms recently standardized by NIST as drop-in replacements for existing classical algorithms on the Web would incur significant performance degradations, making this approach infeasible unless a cryptographically-relevant quantum computer (CRQCs) is imminent. There’s a real risk that post-quantum signatures do not see widespread adoption before CRQCs become a reality, unless we make changes to how signatures are used in the WebPKI.
This talk dives into several of the more promising proposals for making post-quantum signatures deployable, from TLS extensions to reduce the number of transmitted signatures, to using key agreement as an authentication mechanism, to complete overhauls of the WebPKI. We discuss ongoing work to evaluate the feasibility of each of these proposals and to address known unknowns.
(this is a 60 minute session)
16:30
To Hybrid or Not to Hybrid: Navigating the PQC Transition
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Garfield Jones
Associate Chief of Strategic Technology at U.S. Department of Homeland Security
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
As organizations prepare for the post-quantum era, hybrid cryptography has emerged as a contentious strategy. Advocates see it as a pragmatic bridge, combining classical algorithms with quantum-resistant counterparts—or even multiple quantum-resistant algorithms—to ensure security during the transition. Critics, however, argue that hybrid solutions introduce complexity, increase attack surfaces, and may delay full adoption of streamlined quantum-safe algorithms.
This panel brings together experts with diverse perspectives to debate the merits and drawbacks of hybrid cryptography. Should hybrid solutions be embraced as a stepping stone, or do they risk complicating the path to quantum readiness? Attendees will explore the technical, operational, and strategic implications of hybrid approaches, including the potential benefits and challenges of combining multiple quantum-resistant algorithms.
Continuation of prior session
16:55
Closing remarks for day 1
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:00
Networking
19:00
End of Day One
Opening
9:00
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Paul van Brouwershaven is Director of Technology Compliance for Entrust’s certification authority, Chair of the PKI Consortium and former Vice Chair of the CA/Browser Forum.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Quantum Computing: Between Hope and Hype
9:30
Plenary
Abstract
Professor Aaronson will provide a personal perspective on the current state and future prospects of quantum computing, addressing its implications for cryptography and the pressing question of how long current public-key cryptographic systems might remain secure. Following his talk, Professor Aaronson will engage in an open Q&A session, inviting discussion on any aspects of quantum computing.
Speakers
Scott Aaronson
Schlumberger Chair of Computer Science and Founding Director, Quantum Information Center at UT Austin
Scott Aaronson is a renowned theoretical computer scientist and the Schlumberger Centennial Chair of Computer Science at the University of Texas at Austin. His pioneering contributions to quantum computing and computational complexity theory include influential work on the Quantum Turing Machine with postselection, algebrization, and boson sampling.
Aaronson received his B.Sc. in Computer Science from Cornell University and his Ph.D. from the University of California, Berkeley, under the mentorship of Umesh Vazirani. His career includes notable roles at the Institute for Advanced Study, the University of Waterloo, and MIT. He is also the founding director of UT Austin’s Quantum Information Center, a leading hub for advancing quantum research and technology.
His achievements have been recognized with prestigious awards, including the Alan T. Waterman Award, the Presidential Early Career Award for Scientists and Engineers (PECASE), the Tomassoni–Chisesi Prize, and the ACM Prize in Computing. Aaronson is also well known for his blog, Shtetl-Optimized, and his book, Quantum Computing Since Democritus, which make complex scientific concepts accessible to a wide audience.
NIST Post-Quantum Cryptography Update
10:00
Plenary
Abstract
In August 2024, the National Institute of Standards and Technology (NIST) reached a pivotal moment by releasing the first three finalized Post-Quantum Cryptography (PQC) standards: FIPS 203, FIPS 204, and FIPS 205. These standards mark the beginning of a new era in cryptography, designed to protect against the future threat of quantum computing.
In this presentation, Mr. Andrew Regenscheid, Manager Cryptographic Technology Group at NIST, will provide an in-depth update on the newly established FIPS PQC standards. He will also discuss the ongoing efforts to standardize additional cryptographic algorithms, ensuring preparedness for potential vulnerabilities in the current standards.
Mr. Bill Newhouse, a cybersecurity engineer and Project Lead at the NIST National Cybersecurity Center of Excellence (NCCoE), will explain the urgency of transitioning to these new quantum-resistant cryptographic standards. He will also share practical strategies and best practices to facilitate the migration from existing public-key cryptographic systems to these next-generation standards.
Speakers
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Bill Newhouse is a cybersecurity engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).
His work at the NCCoE, NIST’s applied cybersecurity lab, pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies provided by project collaborators. These projects include establishing communities of interest with members from industry, academia, and government to gain insight to define project’s that address cybersecurity risk faced by the members of the community of interest. NCCoE projects are documented in NIST SP 1800 series publications known as practices guides. He has completed guides addressing cybersecurity risk in the hospitality and retail sectors as well as an early demonstration of derived credentials. He recently completed a cybersecurity collaboration with the U.S. Department of Energy that resulted in a Cybersecurity Framework Profile developed for the Liquefied Natural Gas (LNG) industry and the subsidiary functions that support the overarching liquefaction process, transport, and distribution of LNG. His responsibilities as the financial services sector lead also include identifying ways to include financial services sector use case scenarios in relevant NCCoE projects/practice guides. He is presently leading projects on Data Classification and Migration to Post-Quantum Cryptography.
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Andrew Regenscheid is the manager of the Cryptographic Technology Group within the Computer Security Division at NIST. In his 15 years at NIST, Andrew has worked to apply cryptographic algorithms and tools to improve the security of computer platforms, communication protocols, and authentication mechanisms. He currently leads NIST’s development of cryptographic standards and guidelines, which includes efforts on post-quantum cryptography, lightweight block ciphers and hash functions, and privacy-enhancing cryptography.
Transitioning National Security Systems to a Post Quantum Future
11:30
Plenary
Abstract
In this presentation, Dr. Morgan Stern, Senior Subject Matter Expert on Quantum-Resistant Cryptography within the National Security Agency (NSA)’s Cybersecurity Directorate, will discuss the NSA’s approach to transitioning National Security Systems to a post-quantum future. Dr. Stern will highlight key strategies, challenges, and milestones in preparing for the quantum threat, ensuring secure and resilient systems for national defense.
Speakers
Morgan Stern
Senior Quantum Resistant Cryptography Subject Matter Expert at National Security Agency (NSA)
Dr. Morgan Stern is the senior Quantum Resistant Cryptography Subject Matter Expert in the National Security Agency (NSA)’s Cybersecurity Directorate. In that capacity he combines his deep knowledge of public key cryptography and quantum information science to help craft cybersecurity strategy, and advise agencies across the US Government with regards to the threats and opportunities presented by quantum technologies. Prior to this he held a series of technical leadership roles in NSA’s Cybersecurity and Capabilities Directorates where he was responsible for analyzing the security of cryptographic systems, as well as serving joint duty at the Office of the Director for National Intelligence, providing analysis to policy makers.
Dr. Stern earned his PhD in Mathematics from the University of Maryland, College Park, and his BS in Mathematics from the University of Chicago.
Migrating and benchmarking a banking application
11:30
Breakout
Abstract
There is a hesitance to start the migration to quantum-safe solutions, which leads to slower adoption of PQC. This stems from multiple PQC algorithms to choose from, each having specific strong and weaker points, especially with respect to performance, storage and bandwidth. How to deploy these? Hybrid or not? What is the impact on my application? By helping (financial) organisation in migrating their application and testing them in an operational setting, we capture system effects and benchmarking results. In this presentation, I will discuss the results and experiences gained during the migration and share common pitfalls.
Speakers
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO and is one a co-author of the second edition of the PQC migration handbook.
ELI5: Implementing Digital Certificates for a Post-Quantum World
12:00
Plenary
Abstract
This presentation will focus on the pragmatic steps IT teams can take now to prepare for deployment of post-quantum cryptographic algorithms once it becomes practical. This conversation will directly connect the steps back to IT teams’ day-to-day tasks, as it relates to certificate management, and help practitioners identify exactly what they need to do today to begin the process of being post-quantum ready. The presentation will go over: (1) the necessary steps for industry standards bodies to clarify requirements for the new NIST standards; (2) what software, hardware, and services vendors need to do to incorporate support and possible timelines for this support; (3) how enterprises can apply these updates, (4) what you, as an IT manager, can do today to begin the transformation to PQC, and (5) what a likely post-quantum certificate migration plan might look like, including the use of hybrid certificates.
Speakers
Tim Callan
Chief Compliance Officer at Sectigo
Tim Callan has over 20 years of experience in the SSL and PKI technology spaces. Tim leads Sectigo’s conformance with industry and regulatory requirements including browser root programs, WebTrust, CA/Browser Forum, and more. Tim is instrumental in driving initiatives to improve certificate agility and successful issuance. A founding member of the CA/Browser Forum and current vice-chair for one of its working groups, Tim is creator and co-host of “Root Causes: A PKI and Security Podcast”, the world’s most popular podcast dedicated to digital certificates. With 400+ episodes published, Tim is on the forefront of explaining trends that will be essential to the IT professionals, including shortening certificate lifespans and the coming change to post-quantum cryptography.
Architecting PKI Hierarchies for Graceful PQ Migration
12:00
Breakout
Abstract
Public Key Infrastructures (PKIs) are intricate systems to design, deploy, and maintain. As post-quantum cryptography (PQC) becomes a reality, one of the most challenging decisions will be algorithm selection. Historically, this has been straightforward—for example, using RSA-2048-SHA256 consistently throughout the PKI hierarchy. In a PQC world, this approach becomes less viable due to tradeoffs that may require different algorithms or parameters at each layer. For instance, long-term secure algorithms might be optimal for root CAs, high-performance algorithms for issuing CAs, and bandwidth-efficient algorithms for end entities.
Hybrid approaches further complicate these decisions, offering additional security or migration flexibility depending on the use case. This talk explores a “toolbox” of migration mechanisms for X.509 and presents example PKI hierarchies tailored to specific scenarios, illustrating how to navigate the complexity of algorithm choices for a graceful transition to post-quantum cryptography.
Speakers
Mike Ounsworth
Software Security Architect at Entrust
Mike Ounsworth is a Software Security Architect at Entrust. His day-job is primarily application security architecture and penetration testing, with research projects in cryptography and post-quantum cryptography. He is leading discussion at IETF around post-quantum transition strategies for Public Key Infrastructure (PKI), including primary and secondary authorship on several Internet Drafts. He holds an M.Sc in Computer Science in robotics and artificial intelligence from McGill University, and an undergraduate degree in Computer Science with concentrations in mathematics and physics from Queen’s University. Fun fact: he has a decade of experience coaching the high school level FIRST Robotics Competition.
Strategies for Transitioning to Future-Proof Cryptography
12:30
Plenary
Abstract
This panel will bring together industry leaders from the Financial, Mobile, and Healthcare sectors to discuss the critical transition to post-quantum cryptography (PQC). Panelists from leading banks, the GSMA Association, DirectTrust, and other key stakeholders will explore the growing threat posed by quantum computing to traditional cryptographic systems. They will discuss the unique challenges each industry faces in adopting quantum-resistant solutions, including technical, regulatory, and operational hurdles. Key topics will include the current state of readiness, strategies for smooth transitions, the role of standards bodies, and collaborative efforts across industries. The discussion will also address timelines, cost considerations, and the importance of future-proofing critical infrastructure to ensure security in a post-quantum world.
Speakers
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Driven executive leader with over 20 years senior level global experience in digital transformation and telecommunications with a strong technology, strategy and innovation background (development, architecture, product and solution mgt) in Internet of Things, mobile networks, cloud, security, data analytics/ AI, edge. Expertise in building, integrating and delivering innovative digital products and solutions to market, across Private and Public sector within Enterprise.
Leading portfolio and industry efforts on application of Quantum Computing and Quantum Safe in Telecommunications in IBM.
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
Jaime Gómez García is a recognized expert in telecommunications, blockchain, and quantum technologies, with an extensive professional background within the financial sector. His contributions as a disseminator of quantum technologies and their consequential influence on enterprises, notably within the financial domain, have garnered him recognition as a LinkedIn Quantum Top Voices in 2022 and 2023. Currently, Jaime is Head of Quantum Technologies at Banco Santander, addressing how quantum computing can be leveraged in benefit of the business and how to tackle the quantum threat to cryptography.
Scott Stuewe
President and CEO at DirectTrust
Scott Stuewe is a 25+ year veteran of the healthcare information technology industry. As President and CEO of DirectTrust, Scott drives strategy, visibility, and growth of DirectTrust’s focus areas of community, accreditation, standards development, and trust services to contribute to the advancement of trusted healthcare data exchange. Under his tenure, the organization achieved the landmark milestones of one, two, three, and four billion Direct Secure Messages sent and received through the DirectTrust Network, as well as acquired SAFE Identity, and merged with EHNAC. Previously, Stuewe was Director of Strategy and Interoperability at a health information management company, and served more than 24 years at Cerner, including as Cerner Network’s Director of National Interoperability Strategy, where he drove participation in the CommonWell Health Alliance and the bridge with Carequality.
Samantha MabeyModerator
Director of Digital Security Solutions Marketing at Entrust
Samantha Mabey is the Director of Digital Security Solutions Marketing at Entrust, where she oversees marketing strategy and communications for the data security and machine identity solutions, as well as leads the efforts around Zero Trust and Post Quantum. She acts as host of several acclaimed podcasts, including the Cybersecurity Institute Podcast, where she engages with industry experts on critical topics in cybersecurity, digital trust, and post quantum preparedness.
Combining her marketing acumen with a passion for digital security, Samantha is a recognized leader and influential voice in the industry.
Update on end-to-end PKI and HSM integrations with ML-DSA
12:30
Breakout
Abstract
At last years PQC Conference we benchmarked Hardware Securtiy Modules with Dilithium. Now that FIPS-204 is released, it is time to forget about Dilithium and do production level integrations using ML-DSA.
This session shows PKI application integration for issuing certificates, with a number of HSMs that are ready for ML-DSA. We will highlight how easy, or hard, it is to integrate using PKCS#11 or REST APIs. Of course there will be benchmarks of certificate issuance comparing ML-DSA against classic algorithms. Let’s see what else we are able to squeeze in until January.
Speakers
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas is the founder of the open-source PKI project EJBCA and Chief PKI Officer of Keyfactor. He has been implementing PKI systems since 1994 and have contributed to numerous other open source-projects in PKI and applied cryptography. Tomas has been working on applying quantum safe algorithms to PKI for the last couple of years.
2025 is Here - How to get your PQC Readiness Plan Underway
14:00
Plenary
Abstract
2024 saw NIST’s milestone release of the first certified PQC algorithms. As 2025 begins, it is more urgent than ever to “get your house in order” with Quantum Readiness. We will discuss these current & future risks and outline how to effectively counter against evolving threats with strategic and tactical steps within a PQC readiness plan. This session will also identify some of the industry challenges affecting today’s PKI, IoT, TLS & Code Signing. To conclude, strategies will be presented citing real-world examples including PQC code signing that specifically describe ecosystem collaboration and testing within critical enterprise applications and infrastructure.
Speakers
Blair Canavan
Director, Alliances - PQC Portfolio at Thales
Blair has 30+ years of cybersecurity sales, marketing and business development experience. Blair expanded his cybersecurity and cryptographic expertise with Symantec, several cyber start-ups including Chrysalis-ITS (Thales), Titus, Synopsys, InfoSec Global, Crypto4A and since September 2019, was recruited back to Thales’ Global Technology Alliances team, inclusive of the PKI & Post Quantum Cryptography (PQC) portfolio. He is an avid public speaker, start-up consultant and IT industry contributor. Blair holds an Hons.BA from the University of Waterloo and Wilfrid Laurier University, Ontario, Canada.
Online Quantum-safe Readiness Tool
14:00
Breakout
Abstract
The list of standardization based on Post-Quantum Cryptography (PQC) and the NIST IR 8547 initial public draft signal that organizations should begin preparing for their transitions to PQC standards. While transitions to PQC standards cannot be addressed in isolation due to interdependencies that organizations depend on, there are many uncertainties that prevent organizations from taking actionable steps. In order to navigate the complexities of transitions, an online quantum readiness assessment tool is developed to guide organizations. With a multi-dimensional approach, the tool recognizes various dimensions that organizations should consider when transitioning their existing infrastructures. What sets this tool apart from other available tool is its foundation in the scientific methods, utilizing empirical data and addressing context specific transition challenges relevant to PKIs. Since it remains crucial for organizations to gain an overview of transition progress, the tool allows organizations to focus on areas that have low readiness levels and adjust their strategies with a set of possible recommendations.
Speakers
Ini Kong
PhD Researcher at Delft University of Technology
Ini Kong is a PhD Researcher in the Department of Engineering Systems and Services at Delft University of Technology. Under the supervision of Prof.dr.ir. Marijn Janssen and Prof.dr.ir Nitesh Bharosa, her PhD research focuses on Public Key Infrastructure (PKI) systems that facilitate digital communication and information exchange. The aim of the research is to guide organizations transitioning toward Quantum-safe (QS) PKI systems and extend knowledge on the development of a stages-of-growth model for QS transition. Her PhD research is part of a larger project called HAPKIDO (Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organizations) funded by NWO (Netherlands Organization for Scientific Research). The project delivers sector-based plans towards QS PKIs, including hybrid PKIs that demonstrate how QS solutions will work with existing infrastructures, and governance models that guide organizations toward a QS future.
X9 Financial PKI: PQC Readiness and Crypto-Agility for Financial Services
14:30
Plenary
Abstract
Transitioning from legacy asymmetric algorithms to PQC algorithms also means upgrading your PKI and certificates, however the financial services industry has its own needs which no longer aligns with the CA/Browser Forum, the IETF, NIST, or other programs. Consequently, the Accredited Standards Committee (ASC) X9 Financial Services has launched the X9 Financial PKI as an alternative for PQC readiness and crypto-agility to banks, merchants, and third-party financial service providers. This session discusses the issues, the requirements, the technologies, the X9 Financial PKI program, and its first implementation using PQC enabled certificates.
Speakers
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Jeff Stapleton is a security professional with over 40 years’ experience primarily in the financial services industry, focusing on cryptography, PKI and key management. He has participated in the development of numerous ISO and X9 standards for 35 years, chaired the X9F4 Cybersecurity and Cryptography workgroup for 25 years, and a US expert to ISO TC68 Financial Services. Jeff has published papers, written articles, and authored his five-book series Security Without Obscurity with Routledge CRC Press.
Secure e-mail communication is a natural fit for hybrid cryptography, offering long-term confidentiality and non-repudiation for users. This talk introduces a prototype system comprising a Certificate Authority, Certificate Management System, and an extended Open Source client application, including an integration module for Microsoft Outlook.
The presentation explores the selection criteria for hybrid schemes and the rationale behind choosing Composite and ICA approaches to facilitate PKI and S/MIME migration. It also shares insights from implementing and using pure PQC, Composite, and ICA hybrid constructions. Topics include certificate creation, client enrollment, and securely signing and encrypting e-mail messages using S/MIME across various cryptographic configurations, emphasizing the hybrid integration of classical and post-quantum secure cryptography.
Speakers
Jan Klaußner
Senior Product Architect at Bundesdruckerei GmbH
Jan Klaußner studied computer science with focus on cryptography and security at TU Dresden and worked in the IT-Security industry ever since. Several years developing high grade security products provided him a deep understanding of the possibilities and challenges around smart cards and Public Key Infrastructures. Finally, he joined his team at the Bundesdruckerei in 2021 to improve and promote innovative ideas around PKIs and post quantum cryptography.
Why the Internet isn’t ready for Post-Quantum Certificates
15:00
Plenary
Abstract
NIST has finalized the first set of post-quantum algorithms, and post-quantum key agreement has been enabled by default in browsers for over a year. Why are signatures lagging behind? This talk provides the latest updates in a fast-moving ecosystem, a recap of the challenges in migrating to post-quantum certificates, and an overview of ongoing efforts to make post-quantum signatures practical in the WebPKI.
In a followup breakout session, we go into detail into some of the more promising proposals for coping with post-quantum certificates.
Speakers
Luke Valenta
Research Engineer at Cloudflare
Luke Valenta is a research engineer primarily focused on building secure, reliable systems and measuring the Internet.
He is broadly interested in computer security, network and protocol measurement, applied cryptography, privacy, elliptic curves, and distributed systems.
Quantum-Safe Secure Boot: How hard can it be?
15:00
Breakout
Abstract
Secure boot is hard. Quantum-safe secure boot is even harder. It starts with the choice of a suitable algorithm. On the signature verification side, conflicting regulatory requirements on Post-Quantum/Traditional (PQ/T) hybrid mean there is no silver-bullet, while on the signature generation side, key management challenges and the lack of available end-to-end quantum-safe solutions further complicate the decision process.
In this talk we highlight open issues at various stages of the secure boot lifecycle.
Speakers
Axel York Poschmann
VP of Product at PQShield
Dr. Axel York Poschmann is a cryptography expert with over 15 years of experience, blending a strong academic foundation with industry leadership. Formerly an Assistant Professor at Nanyang Technological University, Axel’s research has led to high-impact publications and patents in cryptographic engineering. As VP of Product at PQShield, he drives the development of quantum-safe solutions, collaborating with regulators and industry leaders to advance secure communication systems.
Extending or Evolving: Choosing the Path to Quantum Readiness
16:00
Plenary
Abstract
This panel will delve deeper into the decisions organizations face in securing their systems for the post-quantum era. Should resources be directed toward extending the life of legacy algorithms—such as by increasing RSA key sizes or adopting higher-order elliptic curves—to address immediate security concerns? Or is it more prudent to focus exclusively on transitioning to quantum-resistant algorithms? This session will explore the technical and strategic trade-offs of both approaches, offering insights into the urgency and complexity of achieving quantum readiness.
Speakers
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Bill Newhouse is a cybersecurity engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).
His work at the NCCoE, NIST’s applied cybersecurity lab, pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies provided by project collaborators. These projects include establishing communities of interest with members from industry, academia, and government to gain insight to define project’s that address cybersecurity risk faced by the members of the community of interest. NCCoE projects are documented in NIST SP 1800 series publications known as practices guides. He has completed guides addressing cybersecurity risk in the hospitality and retail sectors as well as an early demonstration of derived credentials. He recently completed a cybersecurity collaboration with the U.S. Department of Energy that resulted in a Cybersecurity Framework Profile developed for the Liquefied Natural Gas (LNG) industry and the subsidiary functions that support the overarching liquefaction process, transport, and distribution of LNG. His responsibilities as the financial services sector lead also include identifying ways to include financial services sector use case scenarios in relevant NCCoE projects/practice guides. He is presently leading projects on Data Classification and Migration to Post-Quantum Cryptography.
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Jeff Stapleton is a security professional with over 40 years’ experience primarily in the financial services industry, focusing on cryptography, PKI and key management. He has participated in the development of numerous ISO and X9 standards for 35 years, chaired the X9F4 Cybersecurity and Cryptography workgroup for 25 years, and a US expert to ISO TC68 Financial Services. Jeff has published papers, written articles, and authored his five-book series Security Without Obscurity with Routledge CRC Press.
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas is the founder of the open-source PKI project EJBCA and Chief PKI Officer of Keyfactor. He has been implementing PKI systems since 1994 and have contributed to numerous other open source-projects in PKI and applied cryptography. Tomas has been working on applying quantum safe algorithms to PKI for the last couple of years.
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
Ralph Spencer Poore is a seasoned technologist with over 50 years of experience in information assurance. He boasts a diverse background as an inventor, author, and instructor, specializing in computer security, information systems audit, applied cryptography, intellectual property, and computer forensics. Ralph serves as Vice Chair of the PQC Working Group of the PKI Consortium, actively contributing to the advancement of post-quantum cryptography.
Making PQ Signatures work in the WebPKI
16:00
Breakout
Abstract
Post-quantum signatures are not easily deployable in the WebPKI. Using the signature algorithms recently standardized by NIST as drop-in replacements for existing classical algorithms on the Web would incur significant performance degradations, making this approach infeasible unless a cryptographically-relevant quantum computer (CRQCs) is imminent. There’s a real risk that post-quantum signatures do not see widespread adoption before CRQCs become a reality, unless we make changes to how signatures are used in the WebPKI.
This talk dives into several of the more promising proposals for making post-quantum signatures deployable, from TLS extensions to reduce the number of transmitted signatures, to using key agreement as an authentication mechanism, to complete overhauls of the WebPKI. We discuss ongoing work to evaluate the feasibility of each of these proposals and to address known unknowns.
(this is a 60 minute session)
Speakers
Luke Valenta
Research Engineer at Cloudflare
Luke Valenta is a research engineer primarily focused on building secure, reliable systems and measuring the Internet.
He is broadly interested in computer security, network and protocol measurement, applied cryptography, privacy, elliptic curves, and distributed systems.
To Hybrid or Not to Hybrid: Navigating the PQC Transition
16:30
Plenary
Abstract
As organizations prepare for the post-quantum era, hybrid cryptography has emerged as a contentious strategy. Advocates see it as a pragmatic bridge, combining classical algorithms with quantum-resistant counterparts—or even multiple quantum-resistant algorithms—to ensure security during the transition. Critics, however, argue that hybrid solutions introduce complexity, increase attack surfaces, and may delay full adoption of streamlined quantum-safe algorithms.
This panel brings together experts with diverse perspectives to debate the merits and drawbacks of hybrid cryptography. Should hybrid solutions be embraced as a stepping stone, or do they risk complicating the path to quantum readiness? Attendees will explore the technical, operational, and strategic implications of hybrid approaches, including the potential benefits and challenges of combining multiple quantum-resistant algorithms.
Speakers
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Andrew Regenscheid is the manager of the Cryptographic Technology Group within the Computer Security Division at NIST. In his 15 years at NIST, Andrew has worked to apply cryptographic algorithms and tools to improve the security of computer platforms, communication protocols, and authentication mechanisms. He currently leads NIST’s development of cryptographic standards and guidelines, which includes efforts on post-quantum cryptography, lightweight block ciphers and hash functions, and privacy-enhancing cryptography.
Garfield Jones
Associate Chief of Strategic Technology at U.S. Department of Homeland Security
Garfield S. Jones is the Associate Chief of Strategic Technology for the Cybersecurity and Infrastructure Security Agency.
Dr. Jones is responsible for developing the strategy and providing guidance on the use of innovative and leading-edge technology across CISA, including articulating and documenting the future technology vision to achieve the organization’s mission objectives and goals.
Dr. Jones was Deputy Program Manager for the Continuous Diagnostics and Mitigation (CDM) Program responsible for Systems Engineering, Architecture, and Testing. Prior to joining DHS, Dr. Jones worked as a Systems Engineer developing complex weapons, geographic, and information systems for agencies such as Office of Naval Intelligence (ONI), National Geospatial Intelligence Agency (NGA), and the Naval Criminal Investigative Service (NCIS). In 2018, he retired from the Army Reserves after serving 25 years (16 years active duty and nine years reservist) as an Information Systems Warrant Officer.
Dr. Jones holds a Doctor of Engineering in Industrial and Systems Engineering with a concentration in Machine Learning and Artificial Intelligence. He serves as a professor at two universities teaching Computer Science and Systems Engineering. Dr. Jones filed for a patent regarding the use of the Probabilistic Neural Network (PNN) for Vulnerabilities Risk Calculation of a Text Document and he was granted the patent in 2023. He is currently working on a second patent.
Lory Thorpe
Quantum Safe Industry Lead at IBM and Chair of the GSMA Post Quantum Telco Network Task Force
Driven executive leader with over 20 years senior level global experience in digital transformation and telecommunications with a strong technology, strategy and innovation background (development, architecture, product and solution mgt) in Internet of Things, mobile networks, cloud, security, data analytics/ AI, edge. Expertise in building, integrating and delivering innovative digital products and solutions to market, across Private and Public sector within Enterprise.
Leading portfolio and industry efforts on application of Quantum Computing and Quantum Safe in Telecommunications in IBM.
Ralph Spencer PooreModerator
Vice Chair of the PQC Working Group of the PKI Consortium
Ralph Spencer Poore is a seasoned technologist with over 50 years of experience in information assurance. He boasts a diverse background as an inventor, author, and instructor, specializing in computer security, information systems audit, applied cryptography, intellectual property, and computer forensics. Ralph serves as Vice Chair of the PQC Working Group of the PKI Consortium, actively contributing to the advancement of post-quantum cryptography.
16:30
Breakout
Abstract
Continuation of prior session
Speakers
Closing remarks for day 1
16:55
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Paul van Brouwershaven is Director of Technology Compliance for Entrust’s certification authority, Chair of the PKI Consortium and former Vice Chair of the CA/Browser Forum.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
8:30
Registration
9:00
Plenary
Update on the NIST standardization of additional signature schemes
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
In this presentation, Mr. Andrew Regenscheid, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
In October 2024, NIST announced 14 Second-Round candidates chosen from 40 First-Round submissions, including CROSS, LESS, and even MAYO, which might bring a bit of flavor to the new algorithms.
These algorithms were selected based on rigorous evaluations of security, performance, and unique algorithm characteristics, reflecting NIST’s ongoing commitment to diversifying post-quantum cryptographic standards. Dr. Moody will discuss each selected scheme’s potential, addressing key innovations and the next steps in the standardization process.
Breakout
PQC Standardization at the Internet Engineering Task Force (IETF)
Mike Ounsworth
Software Security Architect at Entrust
Just as post-quantum cryptography (PQC) has presented significant challenges for academic cryptographers, so too has it posed unique challenges for cryptographic engineers. The new PQC primitives, with their distinct characteristics compared to traditional RSA and ECC algorithms, often require substantial protocol and application redesign to accommodate them effectively. Moreover, the need for a relatively abrupt transition to PQC across the Internet’s vast infrastructure has introduced additional complexities.
This presentation will provide a comprehensive overview of the latest developments in PQC standardization within the IETF. We will delve into the challenges and progress made in integrating PQC into common Internet protocols, highlighting key areas where work is still underway. Additionally, we will explore the implications of the newly standardized algorithms (ML-DSA, SLH-DSA, ML-KEM, LMS, XMSS) and discuss the strategies for their successful deployment. Finally, we will share insights from our research on PKI PQ/traditional hybrid modes, which offer a promising approach for enhancing both security and migration flexibility during the transition to a post-quantum world.
9:30
Plenary
Is CBOM Enough?
Roman Cinkais
Co-founder at 3Key Company
A number of organizations are framing the migration to post-quantum cryptography (PQC) as an opportunity to affect broader IT security modernization across their organizations, especially as it relates to managing the full life cycle of cryptographic algorithms, libraries, and protocols. This presentation introduces the idea of a Cryptographic Bill of Materials (CBOM), often considered a key element of this IT modernization effort. We compare and contrast CBOM with the more familiar Software Bill of Materials (SBOM), paying particular attention to how the cryptographic ecosystem poses unique challenges compared to software-at-large. For example, many cryptographic protocols include a negotiation phase over the wire, complicating the effort to know exactly which algorithm was used in any given protocol handshake. We explore the types of cryptographic assurance that a CBOM can and cannot provide for an organization. Finally, we describe how supplementary efforts such as key management, real-time cryptographic monitoring, and the ability to execute historical queries are needed to fill in the operational gaps of a CBOM.
Breakout
PQC Interoperability Project
Corey Bonnell
Technology Strategist at DigiCert
The Post Quantum Crypto Interoperability project started as a hackathon project at the IETF in 2022. People interested in adding PQ algorithm support into existing X.509 keys, signatures and certificates brough their tools and started to collaborate using the proposed PQC algorithms. The project has continued to grow and includes an artifact repository anyone can use for interoperability testing, a list of prototype OIDS to facilitate interoperability, and a compatibility matrix to demonstrate interoperability between users. With the experience obtained by participating in the project, its collaborators also provide valuable feedback to the emerging standards that are in development for the support of PQC. This talk will give an overview of the project, how to use it for interoperability testing and will encourage you to become a participant in the project.
10:00
Plenary
PQC in FIPS 140-3, status and roadmap
Jonathan Smith
Senior FIPS Tester at DEKRA
Summarize the current state of CMVP algorithm and module validation for PQC algorithms, briefly touch on CMVP plans to speed up module validation through automation, cover 140-3 requirements for PQC algorithms within module, and briefly highlight NSA’s CNSA 2.0 as an example of government requirements for PQC beyond the minimum requirements of CMVP.
Breakout
ETSI ESI and Quantum-Safe Cryptography
Iñigo Barreira
CA Manager at Sectigo
ETSI ESI (Electronic Signatures and Trust Infrastructures) develops policies, security, and technical requirements for Trust Service Providers (TSPs), including certification authorities, time-stamping authorities, and providers of remote signature creation, validation, registered e-delivery, and long-term data preservation services. ETSI ESI also maintains Trusted Lists, which enhance confidence in digital certificates and services by indicating TSP compliance with recognized approval schemes.
This presentation will explore how developments in Quantum-Safe Cryptography (QSC) and Post-Quantum Cryptography (PQC) affect ETSI ESI standards. It will highlight areas where changes from other standards development organizations (SDOs) may influence ETSI ESI work, discuss potential impacts on existing frameworks, and provide an estimated timeline for adoption by consumers and organizations.
10:30
Break
11:00
Plenary
Hardware Cryptographic Modules
Bruno Couillard
Co-Founder & CEO at Crypto4A
Ed Reynolds
Sr. Product Manager, HSM at Entrust
Eric Amador
Product Manager at Thales
Nils Gerhardt
Chief Technology Officer at Utimaco
John BuselliModerator
Offering Manager at IBM Quantum
This panel will explore the integration of Post-Quantum Cryptography (PQC) into Hardware Cryptographic Modules, with a focus on the recently released NIST standards. Panelists will examine the challenges and opportunities related to certifying PQC algorithms in compliance with established security requirements. Key topics will include performance considerations, such as the computational cost of PQC in constrained environments, the importance of ensuring interoperability and crypto agility in the process, and availability, especially the readiness of hardware vendors to meet market demand. The discussion will also address the evolving landscape of certification processes and the implications for secure communications in a Post-Quantum world.
Breakout
Lessons Learned from Testing Millions of Servers for Post-Quantum Compatibility
Syed Suleman Ahmad
Research Engineer at Cloudflare
Protocol ossification delayed the rollout of TLS 1.3 for years, and has once again become a roadblock in the rollout of post-quantum cryptography. In a recent large-scale study of TLS servers, we assessed the deployment compatibility of post-quantum key agreements, uncovering surprising results and insights. Notably, we observed protocol ossification in areas beyond the well-known issue of fragmented ClientHello messages due to large key sizes. We believe more surprises will emerge with post-quantum certificates, making deployment far more complex than a “flip-of-a-switch” transition.
In this talk, we share our findings from the study, and emphasize the importance of testing early to identify potential post-quantum migration challenges rather than making assumptions about where issues may arise. We walk through the subtle deployment complexities and operational issues that can arise when managing the complexities of post-quantum PKI implementations, particularly for end-user connection stability. By offering practical insights, we hope to contribute to a smoother shift to the post-quantum era, enhancing crypto-agility and strengthening the reliability of the Web PKI as a by-product.
11:30
Plenary
Crypto Asset Discovery Tooling – an Overview of Capabilities, Characteristics and Gaps
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
In the migration towards PQC, one of the first steps should be getting an overview of cryptographic assets in your organisation, i.e. where and why are you using which types of cryptographic algorithms, protocols, keys, etc. The result is captured in a Cryptographic Bill-Of-Materials (CBOM). Various commercial solutions exist, but how well are these addressing the problem? In 2024, as an independent research organisation, we have conducted research into crypto asset discovery tooling and their vendors, through literature research and interviews with the vendors. In this presentation, I will give an overview of the currently existing tools, the ideal setting, the gap between them and how to bridge that gap.
Breakout
How much will ML-DSA Signatures affect Web Metrics after all?
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
It is sometimes argued that ML-DSA signatures will increase the size of TLS handshakes by 15KB which will affect web performance significantly. As most web connections transfer much larger amounts of data, 15KB may not impact the bottom line of the most common web performance metrics. In this session, we will present a qualitative analysis of web metrics and their relation to the TLS handshake. We will demonstrate that web connections transport large amounts of web content which takes much longer than the handshake itself. We will also analyze the web page performance metrics of top websites to showcase that an additional 15KB in the handshake will have minimal impact on the user experience. The takeaway of this session will be that ML-DSA will introduce overhead, but after using simple techniques to trim the authentication data in the handshake, the practical effect on web users will not be noticeable.
12:00
Plenary
NIST National Cybersecurity Center of Excellence’s Migration to Post-Quantum Cryptography Project
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
As organizations prepare for the transition to post-quantum cryptography (PQC), the NIST National Cybersecurity Center of Excellence (NCCoE) and its industry collaborators are researching practical approaches for migration to standardized post-quantum cryptography. This presentation by Bill Newhouse, Cybersecurity Engineer and Project Lead at NCCoE, will focus on what the collaboration has learned as it has explored cryptographic discovery and inventory tools and the interoperability of the PQC algorithms being standardized by NIST in the communication protocols and systems that rely on public-key encryption. The session will explore the real-world challenges of transitioning to PQC enabling organizations to safeguard their critical systems against quantum threats. The presentation will highlight NIST Special Publication 1800-38 which is being used to document the insights and findings of this collaborative project.
Breakout
The impact of ML-KEM and ML-DSA on mTLS connection Time-to-Last-Byte
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Multiple studies have evaluated the impact of PQC algorithms in TLS 1.3. These studies have been focusing on server authentication with PQC signatures. To our knowledge, there has been no study focusing on mTLS authentication where the client sends a PQ certificate chain as well. Such connections could be used in Zero Trust Architectures where the client opens multiple connections to various destinations each of which uses mTLS authentication. These sessions will be double impacted by the size of the “authentication data” travelling both directions. This presentation will share experimental results of the Time-to-Last-Byte (TTLB) of mTLS connections using ML-KEM and ML-DSA and transferring small and larger amounts of data. We will evaluate different round-trips, network bandwidth and TCP initial congestion windows. We will discuss the effect of PQC on mTLS sessions and compare it to previous experiments on typical TLS connections. We will cover potential mTLS use-cases that will suffer more than others and ways to improve them.
12:30
Plenary
Practical Insights from Following NIST SP 1800-38B
Alexander Löw
CEO at Data-Warehouse
In this session, Dr. Alexander Löw from Data-Warehouse will share real-world experiences from the National Cybersecurity Center of Excellence (NCCoE) regarding the implementation of NIST SP 1800-38B. Alexander will delve into the practical application of public key application discovery tools within the context of transitioning to PQC.
Participants will gain insights into the step-by-step process outlined in SP 1800-38B, including identifying public key cryptographic algorithms in use, assessing their vulnerability to quantum attacks, developing a migration strategy, and implementing new PQC algorithms.
By walking through the challenges encountered, attendees gain insights into what to expect during their transition, and learn about the role and benefits of Cryptographic Agility, Cryptographic Inventory, Cryptographic Bill of Material (CBOM), Software Bill of Material (SBOM), and Cryptographic Governance, providing comprehensive insights based on real-world experiences from following the National Cybersecurity Center of Excellence (NCCoE).
Breakout
X9.146 Quantum TLS
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
David Hook
VP Software Enginering at Keyfactor
Mike Ounsworth
Software Security Architect at Entrust
The draft standard X9.146 Quantum TLS is nicknamed for enhancing the Transport Layer Security (TLS) protocol to support the NIST PQC algorithms. Security protocols such as TLS, developed and managed by the Internet Engineering Task Force (IETF) various workgroups, are heavily relied upon the financial services industry. However, the financial services industry wants to transition to PQC algorithms sooner rather than later, including banks, merchants, and third party financial service providers. This session introduces the draft X9.146 standard under development by the X9F5 Financial PKI workgroup, and the software engineering for enhancing and successfully testing this standard amongst collaborating industry vendors.
13:00
Lunch
14:00
Plenary
Communication among Financial Institutions: What are the available answers to the quantum threat?
Giuseppe Bruno
Head of Division at Bank of Italy
As central banks, financial institutions, and payment platforms rely heavily on secure communication for transactions, client information, and regulatory compliance, the advent of quantum computing poses a significant threat to some of the classical encryption methods underpinning these systems. Quantum computers, with their potential to solve integer factorization (used in RSA) and discrete logarithm problems (used in ECC) exponentially faster than classical computers, could break widely used cryptographic systems like RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC), which secure most financial communications today. This quantum threat calls for proactive strategies to ensure the long-term security of financial networks. In this work, we have explored the available solutions, working closely with different encryption technologies and key management systems. The network is based on cloud VPN, providing a high level of cryptoagility, or the ability to switch between cryptographic algorithms efficiently, and shows significant interoperability among providers featuring standard protocols."
Breakout
Hybrid PQC Digital Signatures and SSI
Erik Hieta-aho
Senior Scientist at VTT, Research Center of Finland
Self-sovereign identity (SSI) and digital credentials are becoming more and more practical, especially in Europe, and as such it is essential for them to be secured against the quantum threat. As we know PQC is a relatively modern area of cryptography and so we have decided to implement both a classical and a PQC digital signature scheme in a hybrid implementation within an SSI stack. Therefore, providing the classical security we know and trust while also preparing for the eventual quantum computing attack in the future. We are developing a hybrid PQC digital signature scheme in which we are implementing ML-DSA and ECDSA in parallel. The goals of our project also include the benchmarking and comparison of the hybrid vs PQC vs classical implementations.
14:30
Plenary
Curriculum Development for Post-Quantum Workforce Development Programs
José Hernández Pérez
Research Specialist at HPI Consulting & Florida State University
As we transition to Post-Quantum Cryptography (PQC), professionals across various sectors, initially in IT, finance, and business, must be retrained to implement the new NIST protocols and prepare for ongoing crypto-agile updates. This shift presents a unique challenge, as much of this retraining will need to occur on the job through workforce development programs rather than in traditional classroom settings.
This talk will focus on identifying effective strategies for developing retraining programs, drawing from past curriculum models in technologies such as High-Performance Computing and Artificial Intelligence. We will present examples of PQC retraining programs from the cybersecurity and finance sectors, demonstrating how to integrate open-source tutorials, training platforms, textbooks, and existing industry programs into a cohesive, customized curriculum that aligns with each professional’s responsibilities and already established long-term development goals.
This session will offer practical guidance to managers, team leaders and developers for designing their own PQC workforce development curricula, highlighting useful pedagogical frameworks, current tools, and available platforms.
Breakout
Quantum Key Distribution – What is done and what is to come
Jan Klaußner
Senior Product Architect at Bundesdruckerei GmbH
Quantum Key Distribution (QKD) systems promise to be a provably secure key transfer between two peers based on quantum effects that can meet the requirements for a quantum-secure communication in the post-quantum-threat era. For countries as well as for companies worldwide it is essential to keep track with the fast-changing developments on secure communication. The development and application of new cryptographic methods and key exchanges is immanent. We at Bundesdruckerei GmbH, owned by the German Federal Ministry of Finance, had the chance to examine and test several QKD systems and their peripherals within the Qu-Gov project. This talk will show the delimitation of QKD to PQC but also the potential use of a hybrid system and shares our experience with such QKD-systems regarding their performance, use in existing infrastructure, caveats and limits as well as open issues that we see as crucial.
15:00
Plenary
Perspectives on the transition to PQC in the financial sector
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
The race towards post-quantum cryptography has started. While several organizations in the finance sector are taking steps to prepare for the transition, the focus seems to still be building up. This session will provide an update on the status of the transition to PQC in the financial sector, including relevant regulations such as DORA, PCI-DSS, CNSA2, and NIST IR 8547, and how these regulations collectively drive the need for improved cryptography management; the ongoing collaboration in initiatives like the Europol Quantum Safe Financial Forum or the FS-ISAC PQC Workgroup; and the Santander Quantum Threat Program.
Breakout
Is your HSM quantum-ready? Here’s what you need to know!
Bruno Couillard
Co-Founder & CEO at Crypto4A
Every currently deployed HSM must be replaced with a quantum-safe HSM. But what is a quantum-safe HSM. First, it must itself utilize quantum-safe root keys and algorithms for its processing. Second, it must support quantum-safe firmware updates to remain agile and current as algorithms and protocols evolve. Third, it must provide access to PQC algorithms for application integration. These capabilities must be bult-in not bolted-on to an existing HSM. An HSM that exposes PQC algorithms but itself uses classic algorithms is NOT quantum-safe. This talk will explore these issues in detail.
15:30
Plenary
Accelerated Quantum Supercomputing and Post-Quantum Cryptography
Yarkin Doroz
Product Manager at NVIDIA
Accelerated computing is revolutionizing numerous fields, including quantum computing (QC) and artificial intelligence (AI), and is also set to accelerate the development of robust post-quantum cryptographic solutions. This talk explores how cutting-edge AI techniques are addressing challenges within QC across the hardware and software stack to create more optimized circuits, bringing practical quantum computers one step closer. Additionally, this talk will cover how GPU-based acceleration serves as a safeguard against emerging quantum cryptographic threats. We will reveal how GPU-based algorithms are accelerating cryptographic research by examining technical challenges in parallelizing cryptographic workloads across GPUs, managing memory bandwidth, optimizing performance, and overcoming hardware limitations. We will also highlight how these technologies are accelerating QC research. Real-world applications in sectors such as finance, healthcare, and data privacy will be showcased, demonstrating the practical benefits of AI, QC, and PQC.
Breakout
Securing Data in the Quantum Era: From the Root of Trust to Protecting Ecosystems
Nils Gerhardt
Chief Technology Officer at Utimaco
With advancements in Quantum Computing, the security of our data relies heavily on robust cryptographic solutions.
Hardware Security Modules (HSMs) with integrated Post-Quantum Cryptographic (PQC) algorithms become center stage for securing data in the Quantum Computing Era. Besides providing PQC algorithms, HSMs also secure and automate key distribution for “complex to manage” stateful hash-based signature algorithms and provide hardware acceleration to meet modern applications’ cryptographic needs.
Taking those advancements as starting point, the talk will shift gear and explore how security systems, comprising of software and hardware, use Post Quantum primitives to secure their operation. Important systems include Key Management, PKI, and File & Folder Encryption. The role of each system in the security framework will be discussed, focusing on specific PQC requirements.
The talk continues to move to the solution level, and will provide insights and lessons learned for the needs and challenges of securing an inter-banking system, a project currently at the research stage.
By the end of the session, attendees will have a good overview on the capabilities of cryptographic components, how those capabilities can be used by security solutions and what is needed next, to secure whole “Ecosystems” against Quantum Computer attacks on today’s cryptography.
16:00
Plenary
Closing remarks
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
16:10
Networking
18:00
End of Day Two
8:30
Registration
9:00
Update on the NIST standardization of additional signature schemes
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
In this presentation, Mr. Andrew Regenscheid, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
In October 2024, NIST announced 14 Second-Round candidates chosen from 40 First-Round submissions, including CROSS, LESS, and even MAYO, which might bring a bit of flavor to the new algorithms.
These algorithms were selected based on rigorous evaluations of security, performance, and unique algorithm characteristics, reflecting NIST’s ongoing commitment to diversifying post-quantum cryptographic standards. Dr. Moody will discuss each selected scheme’s potential, addressing key innovations and the next steps in the standardization process.
PQC Standardization at the Internet Engineering Task Force (IETF)
Mike Ounsworth
Software Security Architect at Entrust
Just as post-quantum cryptography (PQC) has presented significant challenges for academic cryptographers, so too has it posed unique challenges for cryptographic engineers. The new PQC primitives, with their distinct characteristics compared to traditional RSA and ECC algorithms, often require substantial protocol and application redesign to accommodate them effectively. Moreover, the need for a relatively abrupt transition to PQC across the Internet’s vast infrastructure has introduced additional complexities.
This presentation will provide a comprehensive overview of the latest developments in PQC standardization within the IETF. We will delve into the challenges and progress made in integrating PQC into common Internet protocols, highlighting key areas where work is still underway. Additionally, we will explore the implications of the newly standardized algorithms (ML-DSA, SLH-DSA, ML-KEM, LMS, XMSS) and discuss the strategies for their successful deployment. Finally, we will share insights from our research on PKI PQ/traditional hybrid modes, which offer a promising approach for enhancing both security and migration flexibility during the transition to a post-quantum world.
9:30
Is CBOM Enough?
Roman Cinkais
Co-founder at 3Key Company
A number of organizations are framing the migration to post-quantum cryptography (PQC) as an opportunity to affect broader IT security modernization across their organizations, especially as it relates to managing the full life cycle of cryptographic algorithms, libraries, and protocols. This presentation introduces the idea of a Cryptographic Bill of Materials (CBOM), often considered a key element of this IT modernization effort. We compare and contrast CBOM with the more familiar Software Bill of Materials (SBOM), paying particular attention to how the cryptographic ecosystem poses unique challenges compared to software-at-large. For example, many cryptographic protocols include a negotiation phase over the wire, complicating the effort to know exactly which algorithm was used in any given protocol handshake. We explore the types of cryptographic assurance that a CBOM can and cannot provide for an organization. Finally, we describe how supplementary efforts such as key management, real-time cryptographic monitoring, and the ability to execute historical queries are needed to fill in the operational gaps of a CBOM.
PQC Interoperability Project
Corey Bonnell
Technology Strategist at DigiCert
The Post Quantum Crypto Interoperability project started as a hackathon project at the IETF in 2022. People interested in adding PQ algorithm support into existing X.509 keys, signatures and certificates brough their tools and started to collaborate using the proposed PQC algorithms. The project has continued to grow and includes an artifact repository anyone can use for interoperability testing, a list of prototype OIDS to facilitate interoperability, and a compatibility matrix to demonstrate interoperability between users. With the experience obtained by participating in the project, its collaborators also provide valuable feedback to the emerging standards that are in development for the support of PQC. This talk will give an overview of the project, how to use it for interoperability testing and will encourage you to become a participant in the project.
10:00
PQC in FIPS 140-3, status and roadmap
Jonathan Smith
Senior FIPS Tester at DEKRA
Summarize the current state of CMVP algorithm and module validation for PQC algorithms, briefly touch on CMVP plans to speed up module validation through automation, cover 140-3 requirements for PQC algorithms within module, and briefly highlight NSA’s CNSA 2.0 as an example of government requirements for PQC beyond the minimum requirements of CMVP.
ETSI ESI and Quantum-Safe Cryptography
Iñigo Barreira
CA Manager at Sectigo
ETSI ESI (Electronic Signatures and Trust Infrastructures) develops policies, security, and technical requirements for Trust Service Providers (TSPs), including certification authorities, time-stamping authorities, and providers of remote signature creation, validation, registered e-delivery, and long-term data preservation services. ETSI ESI also maintains Trusted Lists, which enhance confidence in digital certificates and services by indicating TSP compliance with recognized approval schemes.
This presentation will explore how developments in Quantum-Safe Cryptography (QSC) and Post-Quantum Cryptography (PQC) affect ETSI ESI standards. It will highlight areas where changes from other standards development organizations (SDOs) may influence ETSI ESI work, discuss potential impacts on existing frameworks, and provide an estimated timeline for adoption by consumers and organizations.
10:30
Break
11:00
Hardware Cryptographic Modules
Bruno Couillard
Co-Founder & CEO at Crypto4A
Ed Reynolds
Sr. Product Manager, HSM at Entrust
Eric Amador
Product Manager at Thales
Nils Gerhardt
Chief Technology Officer at Utimaco
John BuselliModerator
Offering Manager at IBM Quantum
This panel will explore the integration of Post-Quantum Cryptography (PQC) into Hardware Cryptographic Modules, with a focus on the recently released NIST standards. Panelists will examine the challenges and opportunities related to certifying PQC algorithms in compliance with established security requirements. Key topics will include performance considerations, such as the computational cost of PQC in constrained environments, the importance of ensuring interoperability and crypto agility in the process, and availability, especially the readiness of hardware vendors to meet market demand. The discussion will also address the evolving landscape of certification processes and the implications for secure communications in a Post-Quantum world.
Lessons Learned from Testing Millions of Servers for Post-Quantum Compatibility
Syed Suleman Ahmad
Research Engineer at Cloudflare
Protocol ossification delayed the rollout of TLS 1.3 for years, and has once again become a roadblock in the rollout of post-quantum cryptography. In a recent large-scale study of TLS servers, we assessed the deployment compatibility of post-quantum key agreements, uncovering surprising results and insights. Notably, we observed protocol ossification in areas beyond the well-known issue of fragmented ClientHello messages due to large key sizes. We believe more surprises will emerge with post-quantum certificates, making deployment far more complex than a “flip-of-a-switch” transition.
In this talk, we share our findings from the study, and emphasize the importance of testing early to identify potential post-quantum migration challenges rather than making assumptions about where issues may arise. We walk through the subtle deployment complexities and operational issues that can arise when managing the complexities of post-quantum PKI implementations, particularly for end-user connection stability. By offering practical insights, we hope to contribute to a smoother shift to the post-quantum era, enhancing crypto-agility and strengthening the reliability of the Web PKI as a by-product.
11:30
Crypto Asset Discovery Tooling – an Overview of Capabilities, Characteristics and Gaps
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
In the migration towards PQC, one of the first steps should be getting an overview of cryptographic assets in your organisation, i.e. where and why are you using which types of cryptographic algorithms, protocols, keys, etc. The result is captured in a Cryptographic Bill-Of-Materials (CBOM). Various commercial solutions exist, but how well are these addressing the problem? In 2024, as an independent research organisation, we have conducted research into crypto asset discovery tooling and their vendors, through literature research and interviews with the vendors. In this presentation, I will give an overview of the currently existing tools, the ideal setting, the gap between them and how to bridge that gap.
How much will ML-DSA Signatures affect Web Metrics after all?
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
It is sometimes argued that ML-DSA signatures will increase the size of TLS handshakes by 15KB which will affect web performance significantly. As most web connections transfer much larger amounts of data, 15KB may not impact the bottom line of the most common web performance metrics. In this session, we will present a qualitative analysis of web metrics and their relation to the TLS handshake. We will demonstrate that web connections transport large amounts of web content which takes much longer than the handshake itself. We will also analyze the web page performance metrics of top websites to showcase that an additional 15KB in the handshake will have minimal impact on the user experience. The takeaway of this session will be that ML-DSA will introduce overhead, but after using simple techniques to trim the authentication data in the handshake, the practical effect on web users will not be noticeable.
12:00
NIST National Cybersecurity Center of Excellence’s Migration to Post-Quantum Cryptography Project
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
As organizations prepare for the transition to post-quantum cryptography (PQC), the NIST National Cybersecurity Center of Excellence (NCCoE) and its industry collaborators are researching practical approaches for migration to standardized post-quantum cryptography. This presentation by Bill Newhouse, Cybersecurity Engineer and Project Lead at NCCoE, will focus on what the collaboration has learned as it has explored cryptographic discovery and inventory tools and the interoperability of the PQC algorithms being standardized by NIST in the communication protocols and systems that rely on public-key encryption. The session will explore the real-world challenges of transitioning to PQC enabling organizations to safeguard their critical systems against quantum threats. The presentation will highlight NIST Special Publication 1800-38 which is being used to document the insights and findings of this collaborative project.
The impact of ML-KEM and ML-DSA on mTLS connection Time-to-Last-Byte
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Multiple studies have evaluated the impact of PQC algorithms in TLS 1.3. These studies have been focusing on server authentication with PQC signatures. To our knowledge, there has been no study focusing on mTLS authentication where the client sends a PQ certificate chain as well. Such connections could be used in Zero Trust Architectures where the client opens multiple connections to various destinations each of which uses mTLS authentication. These sessions will be double impacted by the size of the “authentication data” travelling both directions. This presentation will share experimental results of the Time-to-Last-Byte (TTLB) of mTLS connections using ML-KEM and ML-DSA and transferring small and larger amounts of data. We will evaluate different round-trips, network bandwidth and TCP initial congestion windows. We will discuss the effect of PQC on mTLS sessions and compare it to previous experiments on typical TLS connections. We will cover potential mTLS use-cases that will suffer more than others and ways to improve them.
12:30
Practical Insights from Following NIST SP 1800-38B
Alexander Löw
CEO at Data-Warehouse
In this session, Dr. Alexander Löw from Data-Warehouse will share real-world experiences from the National Cybersecurity Center of Excellence (NCCoE) regarding the implementation of NIST SP 1800-38B. Alexander will delve into the practical application of public key application discovery tools within the context of transitioning to PQC.
Participants will gain insights into the step-by-step process outlined in SP 1800-38B, including identifying public key cryptographic algorithms in use, assessing their vulnerability to quantum attacks, developing a migration strategy, and implementing new PQC algorithms.
By walking through the challenges encountered, attendees gain insights into what to expect during their transition, and learn about the role and benefits of Cryptographic Agility, Cryptographic Inventory, Cryptographic Bill of Material (CBOM), Software Bill of Material (SBOM), and Cryptographic Governance, providing comprehensive insights based on real-world experiences from following the National Cybersecurity Center of Excellence (NCCoE).
X9.146 Quantum TLS
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
David Hook
VP Software Enginering at Keyfactor
Mike Ounsworth
Software Security Architect at Entrust
The draft standard X9.146 Quantum TLS is nicknamed for enhancing the Transport Layer Security (TLS) protocol to support the NIST PQC algorithms. Security protocols such as TLS, developed and managed by the Internet Engineering Task Force (IETF) various workgroups, are heavily relied upon the financial services industry. However, the financial services industry wants to transition to PQC algorithms sooner rather than later, including banks, merchants, and third party financial service providers. This session introduces the draft X9.146 standard under development by the X9F5 Financial PKI workgroup, and the software engineering for enhancing and successfully testing this standard amongst collaborating industry vendors.
13:00
Lunch
14:00
Communication among Financial Institutions: What are the available answers to the quantum threat?
Giuseppe Bruno
Head of Division at Bank of Italy
As central banks, financial institutions, and payment platforms rely heavily on secure communication for transactions, client information, and regulatory compliance, the advent of quantum computing poses a significant threat to some of the classical encryption methods underpinning these systems. Quantum computers, with their potential to solve integer factorization (used in RSA) and discrete logarithm problems (used in ECC) exponentially faster than classical computers, could break widely used cryptographic systems like RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC), which secure most financial communications today. This quantum threat calls for proactive strategies to ensure the long-term security of financial networks. In this work, we have explored the available solutions, working closely with different encryption technologies and key management systems. The network is based on cloud VPN, providing a high level of cryptoagility, or the ability to switch between cryptographic algorithms efficiently, and shows significant interoperability among providers featuring standard protocols."
Hybrid PQC Digital Signatures and SSI
Erik Hieta-aho
Senior Scientist at VTT, Research Center of Finland
Self-sovereign identity (SSI) and digital credentials are becoming more and more practical, especially in Europe, and as such it is essential for them to be secured against the quantum threat. As we know PQC is a relatively modern area of cryptography and so we have decided to implement both a classical and a PQC digital signature scheme in a hybrid implementation within an SSI stack. Therefore, providing the classical security we know and trust while also preparing for the eventual quantum computing attack in the future. We are developing a hybrid PQC digital signature scheme in which we are implementing ML-DSA and ECDSA in parallel. The goals of our project also include the benchmarking and comparison of the hybrid vs PQC vs classical implementations.
14:30
Curriculum Development for Post-Quantum Workforce Development Programs
José Hernández Pérez
Research Specialist at HPI Consulting & Florida State University
As we transition to Post-Quantum Cryptography (PQC), professionals across various sectors, initially in IT, finance, and business, must be retrained to implement the new NIST protocols and prepare for ongoing crypto-agile updates. This shift presents a unique challenge, as much of this retraining will need to occur on the job through workforce development programs rather than in traditional classroom settings.
This talk will focus on identifying effective strategies for developing retraining programs, drawing from past curriculum models in technologies such as High-Performance Computing and Artificial Intelligence. We will present examples of PQC retraining programs from the cybersecurity and finance sectors, demonstrating how to integrate open-source tutorials, training platforms, textbooks, and existing industry programs into a cohesive, customized curriculum that aligns with each professional’s responsibilities and already established long-term development goals.
This session will offer practical guidance to managers, team leaders and developers for designing their own PQC workforce development curricula, highlighting useful pedagogical frameworks, current tools, and available platforms.
Quantum Key Distribution – What is done and what is to come
Jan Klaußner
Senior Product Architect at Bundesdruckerei GmbH
Quantum Key Distribution (QKD) systems promise to be a provably secure key transfer between two peers based on quantum effects that can meet the requirements for a quantum-secure communication in the post-quantum-threat era. For countries as well as for companies worldwide it is essential to keep track with the fast-changing developments on secure communication. The development and application of new cryptographic methods and key exchanges is immanent. We at Bundesdruckerei GmbH, owned by the German Federal Ministry of Finance, had the chance to examine and test several QKD systems and their peripherals within the Qu-Gov project. This talk will show the delimitation of QKD to PQC but also the potential use of a hybrid system and shares our experience with such QKD-systems regarding their performance, use in existing infrastructure, caveats and limits as well as open issues that we see as crucial.
15:00
Perspectives on the transition to PQC in the financial sector
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
The race towards post-quantum cryptography has started. While several organizations in the finance sector are taking steps to prepare for the transition, the focus seems to still be building up. This session will provide an update on the status of the transition to PQC in the financial sector, including relevant regulations such as DORA, PCI-DSS, CNSA2, and NIST IR 8547, and how these regulations collectively drive the need for improved cryptography management; the ongoing collaboration in initiatives like the Europol Quantum Safe Financial Forum or the FS-ISAC PQC Workgroup; and the Santander Quantum Threat Program.
Is your HSM quantum-ready? Here’s what you need to know!
Bruno Couillard
Co-Founder & CEO at Crypto4A
Every currently deployed HSM must be replaced with a quantum-safe HSM. But what is a quantum-safe HSM. First, it must itself utilize quantum-safe root keys and algorithms for its processing. Second, it must support quantum-safe firmware updates to remain agile and current as algorithms and protocols evolve. Third, it must provide access to PQC algorithms for application integration. These capabilities must be bult-in not bolted-on to an existing HSM. An HSM that exposes PQC algorithms but itself uses classic algorithms is NOT quantum-safe. This talk will explore these issues in detail.
15:30
Accelerated Quantum Supercomputing and Post-Quantum Cryptography
Yarkin Doroz
Product Manager at NVIDIA
Accelerated computing is revolutionizing numerous fields, including quantum computing (QC) and artificial intelligence (AI), and is also set to accelerate the development of robust post-quantum cryptographic solutions. This talk explores how cutting-edge AI techniques are addressing challenges within QC across the hardware and software stack to create more optimized circuits, bringing practical quantum computers one step closer. Additionally, this talk will cover how GPU-based acceleration serves as a safeguard against emerging quantum cryptographic threats. We will reveal how GPU-based algorithms are accelerating cryptographic research by examining technical challenges in parallelizing cryptographic workloads across GPUs, managing memory bandwidth, optimizing performance, and overcoming hardware limitations. We will also highlight how these technologies are accelerating QC research. Real-world applications in sectors such as finance, healthcare, and data privacy will be showcased, demonstrating the practical benefits of AI, QC, and PQC.
Securing Data in the Quantum Era: From the Root of Trust to Protecting Ecosystems
Nils Gerhardt
Chief Technology Officer at Utimaco
With advancements in Quantum Computing, the security of our data relies heavily on robust cryptographic solutions.
Hardware Security Modules (HSMs) with integrated Post-Quantum Cryptographic (PQC) algorithms become center stage for securing data in the Quantum Computing Era. Besides providing PQC algorithms, HSMs also secure and automate key distribution for “complex to manage” stateful hash-based signature algorithms and provide hardware acceleration to meet modern applications’ cryptographic needs.
Taking those advancements as starting point, the talk will shift gear and explore how security systems, comprising of software and hardware, use Post Quantum primitives to secure their operation. Important systems include Key Management, PKI, and File & Folder Encryption. The role of each system in the security framework will be discussed, focusing on specific PQC requirements.
The talk continues to move to the solution level, and will provide insights and lessons learned for the needs and challenges of securing an inter-banking system, a project currently at the research stage.
By the end of the session, attendees will have a good overview on the capabilities of cryptographic components, how those capabilities can be used by security solutions and what is needed next, to secure whole “Ecosystems” against Quantum Computer attacks on today’s cryptography.
16:00
Closing remarks
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
16:10
Networking
18:00
End of Day Two
Update on the NIST standardization of additional signature schemes
9:00
Plenary
Abstract
In this presentation, Mr. Andrew Regenscheid, a distinguished expert from the U.S. National Institute of Standards and Technology (NIST), will take you on a deep dive into NIST’s standardization efforts for additional signature schemes.
In October 2024, NIST announced 14 Second-Round candidates chosen from 40 First-Round submissions, including CROSS, LESS, and even MAYO, which might bring a bit of flavor to the new algorithms.
These algorithms were selected based on rigorous evaluations of security, performance, and unique algorithm characteristics, reflecting NIST’s ongoing commitment to diversifying post-quantum cryptographic standards. Dr. Moody will discuss each selected scheme’s potential, addressing key innovations and the next steps in the standardization process.
Speakers
Andrew Regenscheid
Manager Cryptographic Technology Group at NIST
Andrew Regenscheid is the manager of the Cryptographic Technology Group within the Computer Security Division at NIST. In his 15 years at NIST, Andrew has worked to apply cryptographic algorithms and tools to improve the security of computer platforms, communication protocols, and authentication mechanisms. He currently leads NIST’s development of cryptographic standards and guidelines, which includes efforts on post-quantum cryptography, lightweight block ciphers and hash functions, and privacy-enhancing cryptography.
PQC Standardization at the Internet Engineering Task Force (IETF)
9:00
Breakout
Abstract
Just as post-quantum cryptography (PQC) has presented significant challenges for academic cryptographers, so too has it posed unique challenges for cryptographic engineers. The new PQC primitives, with their distinct characteristics compared to traditional RSA and ECC algorithms, often require substantial protocol and application redesign to accommodate them effectively. Moreover, the need for a relatively abrupt transition to PQC across the Internet’s vast infrastructure has introduced additional complexities.
This presentation will provide a comprehensive overview of the latest developments in PQC standardization within the IETF. We will delve into the challenges and progress made in integrating PQC into common Internet protocols, highlighting key areas where work is still underway. Additionally, we will explore the implications of the newly standardized algorithms (ML-DSA, SLH-DSA, ML-KEM, LMS, XMSS) and discuss the strategies for their successful deployment. Finally, we will share insights from our research on PKI PQ/traditional hybrid modes, which offer a promising approach for enhancing both security and migration flexibility during the transition to a post-quantum world.
Speakers
Mike Ounsworth
Software Security Architect at Entrust
Mike Ounsworth is a Software Security Architect at Entrust. His day-job is primarily application security architecture and penetration testing, with research projects in cryptography and post-quantum cryptography. He is leading discussion at IETF around post-quantum transition strategies for Public Key Infrastructure (PKI), including primary and secondary authorship on several Internet Drafts. He holds an M.Sc in Computer Science in robotics and artificial intelligence from McGill University, and an undergraduate degree in Computer Science with concentrations in mathematics and physics from Queen’s University. Fun fact: he has a decade of experience coaching the high school level FIRST Robotics Competition.
Is CBOM Enough?
9:30
Plenary
Abstract
A number of organizations are framing the migration to post-quantum cryptography (PQC) as an opportunity to affect broader IT security modernization across their organizations, especially as it relates to managing the full life cycle of cryptographic algorithms, libraries, and protocols. This presentation introduces the idea of a Cryptographic Bill of Materials (CBOM), often considered a key element of this IT modernization effort. We compare and contrast CBOM with the more familiar Software Bill of Materials (SBOM), paying particular attention to how the cryptographic ecosystem poses unique challenges compared to software-at-large. For example, many cryptographic protocols include a negotiation phase over the wire, complicating the effort to know exactly which algorithm was used in any given protocol handshake. We explore the types of cryptographic assurance that a CBOM can and cannot provide for an organization. Finally, we describe how supplementary efforts such as key management, real-time cryptographic monitoring, and the ability to execute historical queries are needed to fill in the operational gaps of a CBOM.
Speakers
Roman Cinkais
Co-founder at 3Key Company
Roman is the co-founder of 3Key Company, which provides services and products related to security in information technology. He has long been involved in public key infrastructure and the development of trust services such as certificate management, digital signature, and cryptographic key management. In 2021, he founded an open-source project called CZERTAINLY for trust service lifecycle management, which aims to help companies increase cryptographic agility and protect against external and internal cyber threats.
PQC Interoperability Project
9:30
Breakout
Abstract
The Post Quantum Crypto Interoperability project started as a hackathon project at the IETF in 2022. People interested in adding PQ algorithm support into existing X.509 keys, signatures and certificates brough their tools and started to collaborate using the proposed PQC algorithms. The project has continued to grow and includes an artifact repository anyone can use for interoperability testing, a list of prototype OIDS to facilitate interoperability, and a compatibility matrix to demonstrate interoperability between users. With the experience obtained by participating in the project, its collaborators also provide valuable feedback to the emerging standards that are in development for the support of PQC. This talk will give an overview of the project, how to use it for interoperability testing and will encourage you to become a participant in the project.
Speakers
Corey Bonnell
Technology Strategist at DigiCert
Corey Bonnell is a Technology Strategist at DigiCert. He has over 15 years of engineering experience in several domains with a deep focus on Public Key Infrastructure. Corey represents DigiCert in several standards organizations, such as the CA/Browser Forum, ETSI, and IETF. He has been involved in the standardization process of emerging standards relating to post-quantum cryptography and is a frequent participant in IETF post-quantum cryptography hackathons.
PQC in FIPS 140-3, status and roadmap
10:00
Plenary
Abstract
Summarize the current state of CMVP algorithm and module validation for PQC algorithms, briefly touch on CMVP plans to speed up module validation through automation, cover 140-3 requirements for PQC algorithms within module, and briefly highlight NSA’s CNSA 2.0 as an example of government requirements for PQC beyond the minimum requirements of CMVP.
Speakers
Jonathan Smith
Senior FIPS Tester at DEKRA
Jonathan Smith has over 25 years experience testing FIPS modules and their algorithms across multiple NVLAP accredited CST laboratories; and frequently contributes to the cryptographic module user forum (CMUF)’s workgroups which develop proposed FIPS 140-3 guidance.
ETSI ESI and Quantum-Safe Cryptography
10:00
Breakout
Abstract
ETSI ESI (Electronic Signatures and Trust Infrastructures) develops policies, security, and technical requirements for Trust Service Providers (TSPs), including certification authorities, time-stamping authorities, and providers of remote signature creation, validation, registered e-delivery, and long-term data preservation services. ETSI ESI also maintains Trusted Lists, which enhance confidence in digital certificates and services by indicating TSP compliance with recognized approval schemes.
This presentation will explore how developments in Quantum-Safe Cryptography (QSC) and Post-Quantum Cryptography (PQC) affect ETSI ESI standards. It will highlight areas where changes from other standards development organizations (SDOs) may influence ETSI ESI work, discuss potential impacts on existing frameworks, and provide an estimated timeline for adoption by consumers and organizations.
Speakers
Iñigo Barreira
CA Manager at Sectigo
Iñigo Barreira has been working in PKI and cybersecurity for more than 25 years and has held technical responsibility positions on CAs/TSPs, Browsers and also Certification Bodies as an auditor. He started working with ETSI ESI in the earlies 2000 and has participated in several STFs developing many of the standards used in the past for the issuance of certificates and also on preservation services which were the germen for the current ENs in where he also participated as editor. He has also participated in some other projects with ENISA (European Agency for Cybersecurity) writing several reports, all related to PKI services. Iñigo is an engineer and holds several technical certifications.
Hardware Cryptographic Modules
11:00
Plenary
Abstract
This panel will explore the integration of Post-Quantum Cryptography (PQC) into Hardware Cryptographic Modules, with a focus on the recently released NIST standards. Panelists will examine the challenges and opportunities related to certifying PQC algorithms in compliance with established security requirements. Key topics will include performance considerations, such as the computational cost of PQC in constrained environments, the importance of ensuring interoperability and crypto agility in the process, and availability, especially the readiness of hardware vendors to meet market demand. The discussion will also address the evolving landscape of certification processes and the implications for secure communications in a Post-Quantum world.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Ed Reynolds
Sr. Product Manager, HSM at Entrust
Ed Reynolds is a Product Manager for Hardware Security Modules in Entrust Digital Security Solutions. He has over 20 years of experience in cybersecurity, covering SSL/VPN, endpoint protection, DLP, data encryption technologies, key management, cryptographic modules and managed security services. Ed has been with Entrust since 2023, with prior positions in Thales CPL, Symantec’s Enterprise and Norton groups, along with software leadership positions in large OEMs. He is based in Austin, Texas.
Eric Amador
Product Manager at Thales
Eric Amador is Product Market Manager at Thales, spearheading the development of the Luna Hardware Security Module (HSM) product line. He leads diverse teams across engineering, sales, marketing, and support to deliver cutting-edge hardware security solutions.
Collaborating closely with R&D, Eric integrates emerging cryptographic technologies, including post-quantum cryptography (PQC), 5G, and crypto assets, to fortify product security. His role involves conducting in-depth market analysis to identify regional trends and customer needs across the Americas, Europe, APAC, and the Middle East. He fosters strategic partnerships with key industry players and ensures products adhere to stringent global and regional security standards, such as FIPS 140-3 Level 3 and Common Criteria EAL4+.
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
John BuselliModerator
Offering Manager at IBM Quantum
John Buselli is an Offering Manager for the IBM Quantum Group and is currently focused on the development and delivery of IBM’s Quantum Safe Program. In this role, he oversees product strategy, market development and customer-facing programs. Since joining IBM Research in 2015, John has focused on cyber security, confidential computing, privacy-enhancing technologies, data governance and securing AI Analytic initiatives.
He previously led a global team at IBM tasked with building an Information Governance/Compliance Practice within the IBM software organization. His career has been focused on establishing and expanding initial markets, products and operations for early-stage software firms including Verity (purchased by HP), and KVS (acquired by Symantec) Princeton Softech (purchased by IBM) as well as senior leadership roles at Seer Technologies and Texas Instruments.
Lessons Learned from Testing Millions of Servers for Post-Quantum Compatibility
11:00
Breakout
Abstract
Protocol ossification delayed the rollout of TLS 1.3 for years, and has once again become a roadblock in the rollout of post-quantum cryptography. In a recent large-scale study of TLS servers, we assessed the deployment compatibility of post-quantum key agreements, uncovering surprising results and insights. Notably, we observed protocol ossification in areas beyond the well-known issue of fragmented ClientHello messages due to large key sizes. We believe more surprises will emerge with post-quantum certificates, making deployment far more complex than a “flip-of-a-switch” transition.
In this talk, we share our findings from the study, and emphasize the importance of testing early to identify potential post-quantum migration challenges rather than making assumptions about where issues may arise. We walk through the subtle deployment complexities and operational issues that can arise when managing the complexities of post-quantum PKI implementations, particularly for end-user connection stability. By offering practical insights, we hope to contribute to a smoother shift to the post-quantum era, enhancing crypto-agility and strengthening the reliability of the Web PKI as a by-product.
Speakers
Syed Suleman Ahmad
Research Engineer at Cloudflare
Suleman is a Research Engineer working at the intersection of product engineering and security research at Cloudflare. His work and academic experience has span the following areas of interest: Security and Privacy, Internet Measurement, and Applied Machine Learning — particularly applications in Cybersecurity, and Distributed Systems.
Crypto Asset Discovery Tooling – an Overview of Capabilities, Characteristics and Gaps
11:30
Plenary
Abstract
In the migration towards PQC, one of the first steps should be getting an overview of cryptographic assets in your organisation, i.e. where and why are you using which types of cryptographic algorithms, protocols, keys, etc. The result is captured in a Cryptographic Bill-Of-Materials (CBOM). Various commercial solutions exist, but how well are these addressing the problem? In 2024, as an independent research organisation, we have conducted research into crypto asset discovery tooling and their vendors, through literature research and interviews with the vendors. In this presentation, I will give an overview of the currently existing tools, the ideal setting, the gap between them and how to bridge that gap.
Speakers
Alessandro Amadori
Cryptographic Researcher at Netherlands Organisation for Applied Scientific Research (TNO)
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO and is one a co-author of the second edition of the PQC migration handbook.
How much will ML-DSA Signatures affect Web Metrics after all?
11:30
Breakout
Abstract
It is sometimes argued that ML-DSA signatures will increase the size of TLS handshakes by 15KB which will affect web performance significantly. As most web connections transfer much larger amounts of data, 15KB may not impact the bottom line of the most common web performance metrics. In this session, we will present a qualitative analysis of web metrics and their relation to the TLS handshake. We will demonstrate that web connections transport large amounts of web content which takes much longer than the handshake itself. We will also analyze the web page performance metrics of top websites to showcase that an additional 15KB in the handshake will have minimal impact on the user experience. The takeaway of this session will be that ML-DSA will introduce overhead, but after using simple techniques to trim the authentication data in the handshake, the practical effect on web users will not be noticeable.
Speakers
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Panos has extensive experience with cyber security, applied cryptography, security automation, and vulnerability management. In his professional career, he has trained and presented on various security topics at technical events for numerous years. He has co-authored cybersecurity publications and participated in various security standards bodies to provide common interoperable protocols and languages for security information sharing, cryptography, and PKI. Currently, he works with engineers and industry standards partners to provide cryptographically secure tools, protocols, and standards.
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
Mila Anastasova is an applied scientist at Amazon. She has received her PhD degree in Computer Engineering at Florida Atlantic University, in 2024. Her research is focused on the implementation and optimization of classical and post-quantum cryptography algorithms for different low- and high-end target platforms, as well as their integration into security network protocols.
NIST National Cybersecurity Center of Excellence’s Migration to Post-Quantum Cryptography Project
12:00
Plenary
Abstract
As organizations prepare for the transition to post-quantum cryptography (PQC), the NIST National Cybersecurity Center of Excellence (NCCoE) and its industry collaborators are researching practical approaches for migration to standardized post-quantum cryptography. This presentation by Bill Newhouse, Cybersecurity Engineer and Project Lead at NCCoE, will focus on what the collaboration has learned as it has explored cryptographic discovery and inventory tools and the interoperability of the PQC algorithms being standardized by NIST in the communication protocols and systems that rely on public-key encryption. The session will explore the real-world challenges of transitioning to PQC enabling organizations to safeguard their critical systems against quantum threats. The presentation will highlight NIST Special Publication 1800-38 which is being used to document the insights and findings of this collaborative project.
Speakers
Bill Newhouse
Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence (NCCoE) at NIST
Bill Newhouse is a cybersecurity engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).
His work at the NCCoE, NIST’s applied cybersecurity lab, pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies provided by project collaborators. These projects include establishing communities of interest with members from industry, academia, and government to gain insight to define project’s that address cybersecurity risk faced by the members of the community of interest. NCCoE projects are documented in NIST SP 1800 series publications known as practices guides. He has completed guides addressing cybersecurity risk in the hospitality and retail sectors as well as an early demonstration of derived credentials. He recently completed a cybersecurity collaboration with the U.S. Department of Energy that resulted in a Cybersecurity Framework Profile developed for the Liquefied Natural Gas (LNG) industry and the subsidiary functions that support the overarching liquefaction process, transport, and distribution of LNG. His responsibilities as the financial services sector lead also include identifying ways to include financial services sector use case scenarios in relevant NCCoE projects/practice guides. He is presently leading projects on Data Classification and Migration to Post-Quantum Cryptography.
The impact of ML-KEM and ML-DSA on mTLS connection Time-to-Last-Byte
12:00
Breakout
Abstract
Multiple studies have evaluated the impact of PQC algorithms in TLS 1.3. These studies have been focusing on server authentication with PQC signatures. To our knowledge, there has been no study focusing on mTLS authentication where the client sends a PQ certificate chain as well. Such connections could be used in Zero Trust Architectures where the client opens multiple connections to various destinations each of which uses mTLS authentication. These sessions will be double impacted by the size of the “authentication data” travelling both directions. This presentation will share experimental results of the Time-to-Last-Byte (TTLB) of mTLS connections using ML-KEM and ML-DSA and transferring small and larger amounts of data. We will evaluate different round-trips, network bandwidth and TCP initial congestion windows. We will discuss the effect of PQC on mTLS sessions and compare it to previous experiments on typical TLS connections. We will cover potential mTLS use-cases that will suffer more than others and ways to improve them.
Speakers
Mila Anastasova
Applied Scientist at Amazon Web Services (AWS)
Mila Anastasova is an applied scientist at Amazon. She has received her PhD degree in Computer Engineering at Florida Atlantic University, in 2024. Her research is focused on the implementation and optimization of classical and post-quantum cryptography algorithms for different low- and high-end target platforms, as well as their integration into security network protocols.
Panos Kampanakis
Principal Security Engineer, Applied Scientist at Amazon Web Services (AWS)
Panos has extensive experience with cyber security, applied cryptography, security automation, and vulnerability management. In his professional career, he has trained and presented on various security topics at technical events for numerous years. He has co-authored cybersecurity publications and participated in various security standards bodies to provide common interoperable protocols and languages for security information sharing, cryptography, and PKI. Currently, he works with engineers and industry standards partners to provide cryptographically secure tools, protocols, and standards.
Practical Insights from Following NIST SP 1800-38B
12:30
Plenary
Abstract
In this session, Dr. Alexander Löw from Data-Warehouse will share real-world experiences from the National Cybersecurity Center of Excellence (NCCoE) regarding the implementation of NIST SP 1800-38B. Alexander will delve into the practical application of public key application discovery tools within the context of transitioning to PQC.
Participants will gain insights into the step-by-step process outlined in SP 1800-38B, including identifying public key cryptographic algorithms in use, assessing their vulnerability to quantum attacks, developing a migration strategy, and implementing new PQC algorithms.
By walking through the challenges encountered, attendees gain insights into what to expect during their transition, and learn about the role and benefits of Cryptographic Agility, Cryptographic Inventory, Cryptographic Bill of Material (CBOM), Software Bill of Material (SBOM), and Cryptographic Governance, providing comprehensive insights based on real-world experiences from following the National Cybersecurity Center of Excellence (NCCoE).
Speakers
Alexander Löw
CEO at Data-Warehouse
Dr. Alexander Löw is the CEO of Data-Warehouse GmbH and serves as a Senator in the German Senate of Economy. He holds the position of Vice President of the German Cybersecurity Council Association and is the innovative mind behind IQIMS and PCert. With a deep understanding of cybersecurity since the 1980s and 25 years of experience as a Data Protection Officer (DPO), Alexander has a strong focus on Public Key Infrastructure (PKI). He has been involved in the conceptualization, building, and maintenance of industrial and governmental CAs (e.g., Macao, German Airforce, BMW) since 2001. In 2012, following a significant APT attack, he began automating PKI processes to enhance cybersecurity. Since 2014, he has been actively involved in publishing and presenting on PKI and cybersecurity topics, and has been conducting PKI trainings for the German BSI Alliance for Cybersecurity since 2015. In 2024, he joined the NIST Post-Quantum Migration Working Group to contribute to the development of standard 1800-38B.
X9.146 Quantum TLS
12:30
Breakout
Abstract
The draft standard X9.146 Quantum TLS is nicknamed for enhancing the Transport Layer Security (TLS) protocol to support the NIST PQC algorithms. Security protocols such as TLS, developed and managed by the Internet Engineering Task Force (IETF) various workgroups, are heavily relied upon the financial services industry. However, the financial services industry wants to transition to PQC algorithms sooner rather than later, including banks, merchants, and third party financial service providers. This session introduces the draft X9.146 standard under development by the X9F5 Financial PKI workgroup, and the software engineering for enhancing and successfully testing this standard amongst collaborating industry vendors.
Speakers
Jeff Stapleton
Executive Director Cybersecurity Researcher at Wells Fargo
Jeff Stapleton is a security professional with over 40 years’ experience primarily in the financial services industry, focusing on cryptography, PKI and key management. He has participated in the development of numerous ISO and X9 standards for 35 years, chaired the X9F4 Cybersecurity and Cryptography workgroup for 25 years, and a US expert to ISO TC68 Financial Services. Jeff has published papers, written articles, and authored his five-book series Security Without Obscurity with Routledge CRC Press.
David Hook
VP Software Enginering at Keyfactor
David has been working on Cryptography APIs and secure protocols since the mid-1990s and in IT and open-source since the mid-1980s. He is a founder and still active committer of the Legion of the Bouncy Castle Cryptography project which began in the year 2000 and provides APIs in Java, C#, and Kotlin. David founded Crypto Workshop, now part of Keyfactor, in 2012 in order to better support the Bouncy Castle APIs and its user community. Shortly after, he led the work on the FIPS certification of the Bouncy Castle APIs, resulting in their first certifications in 2016. His deep interest is in providing tools to simplify the development of solutions that make use of cryptography and secure protocols, with an emphasis on standards-based approaches.
Mike Ounsworth
Software Security Architect at Entrust
Mike Ounsworth is a Software Security Architect at Entrust. His day-job is primarily application security architecture and penetration testing, with research projects in cryptography and post-quantum cryptography. He is leading discussion at IETF around post-quantum transition strategies for Public Key Infrastructure (PKI), including primary and secondary authorship on several Internet Drafts. He holds an M.Sc in Computer Science in robotics and artificial intelligence from McGill University, and an undergraduate degree in Computer Science with concentrations in mathematics and physics from Queen’s University. Fun fact: he has a decade of experience coaching the high school level FIRST Robotics Competition.
Communication among Financial Institutions: What are the available answers to the quantum threat?
14:00
Plenary
Abstract
As central banks, financial institutions, and payment platforms rely heavily on secure communication for transactions, client information, and regulatory compliance, the advent of quantum computing poses a significant threat to some of the classical encryption methods underpinning these systems. Quantum computers, with their potential to solve integer factorization (used in RSA) and discrete logarithm problems (used in ECC) exponentially faster than classical computers, could break widely used cryptographic systems like RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC), which secure most financial communications today. This quantum threat calls for proactive strategies to ensure the long-term security of financial networks. In this work, we have explored the available solutions, working closely with different encryption technologies and key management systems. The network is based on cloud VPN, providing a high level of cryptoagility, or the ability to switch between cryptographic algorithms efficiently, and shows significant interoperability among providers featuring standard protocols."
Speakers
Giuseppe Bruno
Head of Division at Bank of Italy
Giuseppe Bruno is the Head of Division in the Economics and Statistics Department at the Bank of Italy. In his career, he has worked with experts from the Division of Research and Statistics at the Board of Governors of the Federal Reserve System. In 1993, he spent an academic year at the University of Pennsylvania (Philadelphia) for developing algorithms for optimal control of econometric models. In 2000, after a short period at the Statistical Division of the Organisation for Economic Co-operation and Development (OECD), he was appointed Head of the Economic Research Department’s IT unit. In 2022 he has been visiting the Institute of Quantum Computing at the University of Waterloo. Over his career, he has published over 30 papers in different economic and computational economics journals.
Hybrid PQC Digital Signatures and SSI
14:00
Breakout
Abstract
Self-sovereign identity (SSI) and digital credentials are becoming more and more practical, especially in Europe, and as such it is essential for them to be secured against the quantum threat. As we know PQC is a relatively modern area of cryptography and so we have decided to implement both a classical and a PQC digital signature scheme in a hybrid implementation within an SSI stack. Therefore, providing the classical security we know and trust while also preparing for the eventual quantum computing attack in the future. We are developing a hybrid PQC digital signature scheme in which we are implementing ML-DSA and ECDSA in parallel. The goals of our project also include the benchmarking and comparison of the hybrid vs PQC vs classical implementations.
Speakers
Erik Hieta-aho
Senior Scientist at VTT, Research Center of Finland
Erik Hieta-aho is a senior scientist in the applied cryptography research group at VTT, Finland’s research center. He received his PhD in mathematics at Ohio University in 2018 with a focus on error corrected coding theory. He has taken part in projects implementing a self-sovereign identity manager and studying the modern post-quantum cryptographic algorithms. He has interests in various contexts of PQC and the applications of cryptography.
Curriculum Development for Post-Quantum Workforce Development Programs
14:30
Plenary
Abstract
As we transition to Post-Quantum Cryptography (PQC), professionals across various sectors, initially in IT, finance, and business, must be retrained to implement the new NIST protocols and prepare for ongoing crypto-agile updates. This shift presents a unique challenge, as much of this retraining will need to occur on the job through workforce development programs rather than in traditional classroom settings.
This talk will focus on identifying effective strategies for developing retraining programs, drawing from past curriculum models in technologies such as High-Performance Computing and Artificial Intelligence. We will present examples of PQC retraining programs from the cybersecurity and finance sectors, demonstrating how to integrate open-source tutorials, training platforms, textbooks, and existing industry programs into a cohesive, customized curriculum that aligns with each professional’s responsibilities and already established long-term development goals.
This session will offer practical guidance to managers, team leaders and developers for designing their own PQC workforce development curricula, highlighting useful pedagogical frameworks, current tools, and available platforms.
Speakers
José Hernández Pérez
Research Specialist at HPI Consulting & Florida State University
José Hernández Pérez is an educational consultant specializing in emerging technologies for business, including artificial intelligence, quantum computing, and high-performance computing. He also works as an Applications Specialist at Florida State University’s Research Computing Center, focusing on curriculum development and providing research software support in the humanities, arts, and social sciences. His mission is to equip students at every career stage with the skills and resources they need to pursue their passions wherever they may lead them. José Hernández graduated from the University of Chicago with a MA in Digital Studies and a BA in History.
Quantum Key Distribution – What is done and what is to come
14:30
Breakout
Abstract
Quantum Key Distribution (QKD) systems promise to be a provably secure key transfer between two peers based on quantum effects that can meet the requirements for a quantum-secure communication in the post-quantum-threat era. For countries as well as for companies worldwide it is essential to keep track with the fast-changing developments on secure communication. The development and application of new cryptographic methods and key exchanges is immanent. We at Bundesdruckerei GmbH, owned by the German Federal Ministry of Finance, had the chance to examine and test several QKD systems and their peripherals within the Qu-Gov project. This talk will show the delimitation of QKD to PQC but also the potential use of a hybrid system and shares our experience with such QKD-systems regarding their performance, use in existing infrastructure, caveats and limits as well as open issues that we see as crucial.
Speakers
Jan Klaußner
Senior Product Architect at Bundesdruckerei GmbH
Jan Klaußner studied computer science with focus on cryptography and security at TU Dresden and worked in the IT-Security industry ever since. Several years developing high grade security products provided him a deep understanding of the possibilities and challenges around smart cards and Public Key Infrastructures. Finally, he joined his team at the Bundesdruckerei in 2021 to improve and promote innovative ideas around PKIs and post quantum cryptography.
Perspectives on the transition to PQC in the financial sector
15:00
Plenary
Abstract
The race towards post-quantum cryptography has started. While several organizations in the finance sector are taking steps to prepare for the transition, the focus seems to still be building up. This session will provide an update on the status of the transition to PQC in the financial sector, including relevant regulations such as DORA, PCI-DSS, CNSA2, and NIST IR 8547, and how these regulations collectively drive the need for improved cryptography management; the ongoing collaboration in initiatives like the Europol Quantum Safe Financial Forum or the FS-ISAC PQC Workgroup; and the Santander Quantum Threat Program.
Speakers
Jaime Gómez García
Head of Quantum at Banco Santander and Chair of the Quantum Safe Financial Forum
Jaime Gómez García is a recognized expert in telecommunications, blockchain, and quantum technologies, with an extensive professional background within the financial sector. His contributions as a disseminator of quantum technologies and their consequential influence on enterprises, notably within the financial domain, have garnered him recognition as a LinkedIn Quantum Top Voices in 2022 and 2023. Currently, Jaime is Head of Quantum Technologies at Banco Santander, addressing how quantum computing can be leveraged in benefit of the business and how to tackle the quantum threat to cryptography.
Is your HSM quantum-ready? Here’s what you need to know!
15:00
Breakout
Abstract
Every currently deployed HSM must be replaced with a quantum-safe HSM. But what is a quantum-safe HSM. First, it must itself utilize quantum-safe root keys and algorithms for its processing. Second, it must support quantum-safe firmware updates to remain agile and current as algorithms and protocols evolve. Third, it must provide access to PQC algorithms for application integration. These capabilities must be bult-in not bolted-on to an existing HSM. An HSM that exposes PQC algorithms but itself uses classic algorithms is NOT quantum-safe. This talk will explore these issues in detail.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Accelerated Quantum Supercomputing and Post-Quantum Cryptography
15:30
Plenary
Abstract
Accelerated computing is revolutionizing numerous fields, including quantum computing (QC) and artificial intelligence (AI), and is also set to accelerate the development of robust post-quantum cryptographic solutions. This talk explores how cutting-edge AI techniques are addressing challenges within QC across the hardware and software stack to create more optimized circuits, bringing practical quantum computers one step closer. Additionally, this talk will cover how GPU-based acceleration serves as a safeguard against emerging quantum cryptographic threats. We will reveal how GPU-based algorithms are accelerating cryptographic research by examining technical challenges in parallelizing cryptographic workloads across GPUs, managing memory bandwidth, optimizing performance, and overcoming hardware limitations. We will also highlight how these technologies are accelerating QC research. Real-world applications in sectors such as finance, healthcare, and data privacy will be showcased, demonstrating the practical benefits of AI, QC, and PQC.
Speakers
Yarkin Doroz
Product Manager at NVIDIA
Yarkin Doroz is a product manager for Encryption Libraries on the NVIDIA Enterprise product team. He ensures the development of cutting-edge encryption solutions to keep Nvidia’s products at the forefront of security technology. Prior to joining NVIDIA, Yarkin co-founded two startups and served as a teaching professor at Worcester Polytechnic Institute (WPI). His expertise includes Post-Quantum Cryptography, Fully Homomorphic Encryption, and Side-Channel Attacks.
Securing Data in the Quantum Era: From the Root of Trust to Protecting Ecosystems
15:30
Breakout
Abstract
With advancements in Quantum Computing, the security of our data relies heavily on robust cryptographic solutions.
Hardware Security Modules (HSMs) with integrated Post-Quantum Cryptographic (PQC) algorithms become center stage for securing data in the Quantum Computing Era. Besides providing PQC algorithms, HSMs also secure and automate key distribution for “complex to manage” stateful hash-based signature algorithms and provide hardware acceleration to meet modern applications’ cryptographic needs.
Taking those advancements as starting point, the talk will shift gear and explore how security systems, comprising of software and hardware, use Post Quantum primitives to secure their operation. Important systems include Key Management, PKI, and File & Folder Encryption. The role of each system in the security framework will be discussed, focusing on specific PQC requirements.
The talk continues to move to the solution level, and will provide insights and lessons learned for the needs and challenges of securing an inter-banking system, a project currently at the research stage.
By the end of the session, attendees will have a good overview on the capabilities of cryptographic components, how those capabilities can be used by security solutions and what is needed next, to secure whole “Ecosystems” against Quantum Computer attacks on today’s cryptography.
Speakers
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
Closing remarks
16:00
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology Compliance at Entrust
Paul van Brouwershaven is Director of Technology Compliance for Entrust’s certification authority, Chair of the PKI Consortium and former Vice Chair of the CA/Browser Forum.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Please note that speakers were not permitted to promote products or services during their presentations. While commercials, workshops, and pitches included commercial information, the primary focus of the conference remained on educational content.
This conference was made possible through the support of the Post-Quantum Cryptography Working Group and the following organizations:
For more information about the conference, please contact the PKI Consortium at [email protected].
Suggested Accommodations for the Third Post-Quantum Cryptography Conference To make your stay in Austin as comfortable as possible, we’ve compiled a list of recommended accommodation options near the Thompson Conference Center. Whether you’re looking for a budget-friendly option or a luxurious stay, you’ll find plenty of choices to suit your preferences.
Participate in our community discussions and/or join the consortium