Overview
Explore a conference talk from DefCamp 2018 focusing on lattice-based Merkle trees for post-quantum cryptography. Delve into private and public-key encryption, quantum computing threats, and various signature schemes including Lamport-Diffie and Winternitz. Learn about key generation, document signing, signature verification, and PRNG integration. Understand efficiency problems and potential vulnerabilities in PRNGs. Gain insights into cutting-edge cryptographic techniques designed to withstand quantum computing attacks, presented by experts at one of Central and Eastern Europe's premier information security conferences.
Syllabus
Intro
Private Key Encryption
Public-key encryption
Quantum computers
LAMPORT-DIFFIE ONE-TIME SIGNATURE SCHEME (KEY GENERATION)
DOCUMENT SIGNATURE
WINTERNITZ ONE TIME SIGNATURE SCHEME. KEY GENERATION
SIGNATURE GENERATION
SIGNATURE VERIFICATION
PRNG INTEGRATION
Breaking PRNG
Efficiency problems
THANK YOU! QUESTIONS?
Taught by
DefCamp