The inaugural Malaysian Society for Cryptology Research (MSCR) Cryptography School (CRYPTOS) 2021 will be held virtually on 7 December 2021. The main target audience of this school are postgraduate students working in the area of authenticated encryption (AE), post-quantum cryptography and cryptographic protocols. We also welcome anyone, including those in the industry to participate in this first ever CRYPTOS.
MSCR offers stipends to 30 students. The student must already have been registered at a university in Malaysia. To apply, please send an e-mail with the subject “MSCR CRYPTOS 2021 Stipend” to reza [dot] zaba [at] um.edu.my.
Tenured Faculty Member at Max Planck Institute for Security and Privacy, Germany; and Professor at Radboud University, the Netherlands
Introduction to Lattice-Based Key Encapsulation Mechanism (KEM) and Hash-Based Digital Signature Schemes
Peter Schwabe is research group leader at MPI-SP and professor at Radboud University. He graduated from RWTH Aachen University in computer science in 2006 and received a Ph.D. from the Faculty of Mathematics and Computer Science of Eindhoven University of Technology in 2011. He then worked as a postdoctoral researcher at the Institute for Information Science and the Research Center for Information Technology Innovation of Academia Sinica, Taiwan and at National Taiwan University. His research area is cryptographic engineering; in particular the security and performance of cryptographic software. He published more than 50 articles in journals and at international conferences presenting, for example, fast software for a variety of cryptographic primitives including AES, hash functions, elliptic-curve cryptography, and cryptographic pairings. He has also published articles on fast cryptanalysis, in particular attacks on the discrete-logarithm problem. In recent years he has focused in particular on post-quantum cryptography. He co-authored the "NewHope" and "NTRU-HRSS" lattice-based key-encapsulation schemes which were used in post-quantum TLS experiments by Google and is co-submitter of seven proposals to the NIST post-quantum crypto project, all of which made it to the second round and five of which made it to the third round.
Associate Professor at the University of Waterloo, Canada
The Security of Internet Protocols and Moving Towards Post-Quantum Transport Layer Security (TLS)
Dr. Douglas Stebila is an Associate Professor of cryptography in the Department of Combinatorics & Optimization at the University of Waterloo in Waterloo, Ontario, Canada. His research focuses on improving the security of key exchange protocols and Internet cryptography protocols such as TLS and SSH, including the development of quantum-resistant solutions. He is the leader of the Open Quantum Safe project, an open-source software project for prototyping and evaluating quantum-resistant cryptography. He holds an MSc from the University of Oxford and a PhD from the University of Waterloo, and held previous academic appointments at the Queensland University of Technology in Brisbane, Australia, and McMaster University in Hamilton, Ontario, Canada.
Research Scientist at Nanyang Technological University, Singapore
Authenticated Encryption Schemes and Tweakable Block Ciphers
Mustafa Khairallah currently is a Research Scientist at Temasek Labs @ NTU, Singapore, working on the design and analysis of symmetric-key cryptographic algorithms. He obtained his Ph.D. from NTU, Singapore, in 2021 and his B.Sc. from Alexandria University, Egypt, in 2013. He has worked on several cryptographic research projects including the design and analysis of authenticated encryption and hardware implementations of cryptographic algorithms
All timings are listed in Malaysia time zone (UTC +8)
|Tuesday, 7 December 2021
|7.00 am - 7.50 am
|7.50 am - 8.00 am
|8.00 am - 9.00 am
The Security of Internet Protocols and Moving Towards Post-Quantum Transport Layer Security (TLS) - Part 1
Abstract: I’ll give a review of common Internet cryptography protocols like the Transport Layer Security (TLS) protocol, the Secure Shell (SSH) protocol, and the Signal secure messaging protocol. I’ll discuss the methods by which we formalize and analyze the security of these protocols.
|9.00 am - 9.10 am
|9.10 am - 10.10 am
The Security of Internet Protocols and Moving Towards Post-Quantum Transport Layer Security (TLS) - Part 2
Abstract: I’ll discuss the transition to post-quantum cryptography in the context of the TLS protocol. I’ll explain the "hybrid" or "composite" options, in which two algorithms – a traditional algorithm and a post-quantum one – are used simultaneously, and give an update on the progress towards standardization of these options. I’ll also present the KEMTLS alternative protocol design which uses long-term KEM keys for TLS handshake authentication instead of digital signatures, which can be more efficient for both communication and computation.
|10.10 am - 10.25 am
|10.30 am - 11.30 am
Authenticated Encryption and Tweakable Block Ciphers (TBCs)
Abstract: An authenticated encryption with associated data (AEAD) scheme is a symmetric-key scheme that performs both encryption and authentication simultaneously. It has become an essential part of the symmetric-key cryptography toolbox, with two recent major cryptographic competitions to design new AE schemes. The research on AE has led to the acceleration of research on tweakable block ciphers (TBC), a variant of classical block cipher that includes more parameterisation and leads to more efficient and more secure algorithms. In this talk, I will present the basic concepts, security notions and examples of authenticated encryption as well as tweakable block ciphers. I will also discuss the relation between the two primitives and how the tweakable block ciphers impacted the design of authenticated encryption schemes.
|11.30 am - 11.40 am
|11.40 am - 12.40 pm
Romulus: A Symmetric-Key Family of Algorithms from TBCs
Abstract: Romulus is a finalist in the NIST lightweight cryptography standardization project. It is designed by a team of cryptographers from major Asian institutions in Singapore, Japan and China. It includes three AEAD schemes with different security and performance goals, and an efficient hash function. In this talk, I will explain the different schemes, their security and performance. I will also touch on the design process of these schemes and will talk about their current implementations and possible future directions.
|12.40 pm - 12.55 pm
|12.55 pm - 2.30 pm
|2.30 pm - 3.30 pm
Introduction to Lattice-Based Key Encapsulation Mechanism (KEM)
Abstract: In the first part I will give an introduction to the design of lattice-based KEMs from a crypto-engineering perspective and explain why this category of post-quantum cryptography was represented with more proposals in the NIST PQC standardization project than any other category.
|3.30 pm - 3.40 pm
|3.40 pm - 4.40 pm
Introduction to Hash-Based Signatures
Abstract: In the second part of my talk, I will introduce hash-based signatures, arguably the most conservative asymmetric post-quantum construction. We will start with very simple one-time signatures, through stateful many-time signatures, and eventually arrive at the state of the art in stateless hash-based signatures: the SPHINCS+ signature framework.
|4.40 pm - 4.55 pm
|4.55 pm - 5.05 pm
Registration fee can be paid to the following account:
|Persatuan Penyelidikan Kriptologi Malaysia
|CIMB Bank Berhad
|CIMB Bank, UPM Branch, 43400 Serdang, Selangor, MALAYSIA
Once registration has been made, kindly send the payment receipt to email@example.com and CC to firstname.lastname@example.org
Prof. Dr. Muhammad Rezal bin Dato' Kamel Ariffin (Universiti Putra Malaysia)
Dr. Muhammad Reza bin Z'aba (Universiti Malaya)
Dr. Amir Hamzah bin Abd Ghafar (Universiti Putra Malaysia)
- Assoc. Prof. Dr. Ainuddin Wahid Abdul Wahab (Universiti Malaya)
- Ms. Aniza Abd Ghani (Universiti Putra Malaysia)
- Ms. Hazlin Abd Rani (CyberSecurity Malaysia)
- Dr. Normahirah Nek Abd Rahman (Universiti Kebangsaan Malaysia)
- Ms. Nik Azura Nik Abdullah (CyberSecurity Malaysia)
- Mr. Wan Zariman Omar (CyberSecurity Malaysia)
- Assoc. Prof. Ts. Dr. Yap Wun She (Universiti Tunku Abdul Rahman)