Blogs (4) >>
Sat 23 Mar 2024 10:45 - 11:10 at Meeting Rooms B117-119 - Networking and Security Chair(s): Ghita Amor-Tijani

The security of many commonly used cryptographic protocols, especially public-key cryptosystems, would be compromised if general-purpose, large-scale, fault-tolerant quantum computers become a reality. In this paper we present our experience developing and launching a course in Post-Quantum Cryptography (PQC). PQC refers to cryptographic systems that are secure against both quantum and classical computers. Such systems may be achieved through classical (i.e. non-quantum) means.

Because of progress in the design of quantum computers and the ongoing National Institute of Standards and Technology (NIST) process to develop post-quantum cryptographic systems, we realized that there is a need to design a course that covers the consequences of developments in quantum computing (QC), the threats of QC to currently used cryptographic schemes, and how to mitigate those threats by developing quantum-resistant schemes. We designed a new course that is attracting students interested in the future of cryptography and computing security/cybersecurity. We first offered it as an MS-level graduate course, also open to upper-level undergraduates, in Spring 2022, and followed with the second offering in Spring 2023. The course covers the PQC algorithm design process, the consequences of QC, some computationally hard problems and then discusses selected proposals for post-quantum cryptosystems designed to be resistant to known classical and quantum attacks. Three main types of such designs include lattice-based, code-based, and hash-based schemes. These three types are used both for key encapsulation methods (KEM) and digital signatures (DS), and more generally for encryption and authentication.

Sat 23 Mar

Displayed time zone: Pacific Time (US & Canada) change

10:45 - 12:00
Networking and SecurityPapers at Meeting Rooms B117-119
Chair(s): Ghita Amor-Tijani Northeastern University
10:45
25m
Talk
Designing and Delivering a Post-Quantum Cryptography Course
Papers
Thomas J. Borrelli Rochester Institute of Technology, Monika Polak University of Rochester, Stanislaw Radziszowski Rochester Institute of Technology
DOI
11:10
25m
Talk
ALAN: Assessment-as-Learning Authentic tasks for NetworkingGlobal
Papers
Sepehr Minagar Monash University, Amin Sakzad Monash University, Guido Tack Monash University, Carsten Rudolph Monash University, Judy Sheard Monash University
DOI
11:35
25m
Talk
How do Computing Students Conceptualize Cybersecurity? Survey Results and Strategies for Curricular Integration
Papers
Noah Q. Cowit University of Colorado, Boulder, Vidushi Ojha University of Illinois at Urbana-Champaign, Casey Fiesler University of Colorado Boulder
DOI