The SAFEcrypto consortium has been developing a series of videos to discuss the SAFEcrypto technologies and demonstrate the outcomes of the SAFEcrypto project. Watch them now via the Outcomes->Videos menu option or via this link
SAFEcrypto’s libsafecrypto, which provides a suite of software routines to implement lattice-based cryptographic schemes, is now available at: https://github.com/safecrypto/. The related wiki describes the current status of libsafecrypto and provides an ongoing description of its current capabilities.
The following schemes are currently supported:
Signatures: BLISS-B; Dilithium / Dilithium-G; ENS; DLP; Ring-TESLA
KEM: ENS; Kyber
Encryption: RLWE; Kyber
The 16th IMA International Conference on Cryptography and Coding (IMACC 2017), was held on 12 – 14 December 2017, St Catherine’s College, University of Oxford, UK, in co-operation with the IACR and supported by SAFEcrypto.
Invited Speakers included:
- Dr Jan Camenisch, IBM Research, Zurich
- Dr Thomas Prest, Thales Communications & Security, France
- Dr Nicolas Sendrier, INRIA, France
- Dr Daniele Micciancio, University of California, San Diego, US
A special session on Lattice-based Cryptographic Constructions and Architectures was organised by Martin Albrecht & Máire O’Neill.
Further information and speakers’ slides can be found at the IMACC website: http://www.csit.qub.ac.uk/IMACC2017/
The 5th ETSI/IQC Workshop will take place in London (UK) on 13 – 15 September 2017.
Further details can be found here.
We held a very successful project review last week (Wednesday 14 Sept) in Brussels for SAFEcrypto. We were hosted in the Office of the NI Executive in Brussels (ONIEB) and we would like to thank ONIEB Director, Andrew Elliott and Senior EU Liaison Office Stephen Duffy for their support and hospitality during the review. Andrew’s staff including Corrine Becquevort and Lucy Pollock where of invaluable help to us.
Two new deliverables have been added to the SAFEcrypto Outcomes page. These are:
SAFEcrypto D3.1 Risk and Vulnerability Assessment of Lattice-based Cryptographic Architectures
SAFEcrypto D7.1 State-of-the-Art in Physical Side-Channel Attacks and Resistant Technologies
- SAFEcrypto_D7.1 Approved (PDF)
Internet Engineering Task Force (IETF), the main body behind standards for the Internet has on November 3 published RFC 7693 “The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)”, edited by CSIT Research Fellow Dr. Markku-Juhani O. Saarinen. RFC Text: https://tools.ietf.org/html/rfc7693
Publication of this SHA3 finalist as an RFC together with related ISO Object Identifiers enables its use in security protocols such as TLS and IPSec, in PKI certificates, and other security applications. The algorithm comes in two variants, both of which have received extensive cryptanalysis. BLAKE2b outperforms the MD5, MD6, SHA1, SHA2, and the SHA3 algorithm Keccak (by a factor of three), making it the fastest message integrity algorithm currently available. Thanks to its built-in MAC functionality we expect to see it used in high-performance applications such as VPN backbone links. The BLAKE2s variant is optimized for 8- to 32-bit platforms and has significantly smaller implementation footprint than any other secure cryptographic hash function. We expect to see it used in embedded, smart card, and Internet of Things (IoT) security applications. The design work of BLAKE was led by Jean-Philippe Aumasson, principal cryptographer at Kudelski Security, Switzerland. BLAKE2 is also described in the 2015 book “The Hash Function BLAKE”. For more information: http://blake2.net/
This month, the NSA announced plans that NIST’s Suite B cryptographic algorithms will be transitioning to quantum resistant algorithms in the not too distant future with the goal of providing cost-effective security against a potential quantum computer. They also advised vendors who have not yet transitioned to the Suite B elliptic curve algorithms to wait instead on the quantum-resistant algorithm suite. For the full announcement, visit:
- About SAFEcrypto
- Case Studies
- External Advisory Board
- More Information
- News and Events
- NIST Software Analysis – Encryption
- NIST Software Analysis – KEM
- NIST Software Analysis – Signatures
- Post-Quantum Crypto Lounge
- Related Projects
- Round 1 Candidates
- Round 2 Candidates