# Introduction to Quantum-Safe Cryptography
  An SLMath+IBM research school

## Summary


## When? Where?

**From June 24 to July 5, 2024**

ThinkLab
IBM Research Switzerland
Säumerstrasse 4, 8803 Rüschlikon
47.30974,8.54530See on a map.

Schedule

9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
Mon 24
Welcome @IBM
Lattices
coffee
Lattices (PS)
lunch
Isogenies
coffee
Isogenies (PS)
Welcome by SLMath
Tue 25
Isogenies
coffee
Isogenies (PS)
lunch
Lattices
coffee
Lattices (PS)
Wed 26
Lattices
Isogenies
Lab tour
Social activity
Thu 27
Lattices
Lattices (PS)
Isogenies
coffee
NIST summary
Student presentations
Fri 28
Isogenies
Isogenies (PS)
Lattices
Careers panel

9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
Mon 1
Codes
coffee
Codes (PS)
lunch
Multivariate
coffee
Multivariate (PS)
Tue 2
Multivariate
Multivariate (PS)
Codes
Student presentations
Wed 3
Codes
Multivariate
Thu 4
Multivariate
Multivariate (PS)
Codes
coffee
Codes (PS)
Fri 5
Codes¹
Codes (PS)
lunch with A. Curioni, lab director
Multivariate
Student presentations

¹ Class starts 10 minutes earlier, at 8:50am.


## Preparing for the school


## Courses

### Lattice-based cryptography
    by Vadim Lyubashevsky (IBM Research, Switzerland)

The course will cover the following topics:

The only prerequisites are a basic course in linear and abstract algebra.

### Isogeny-based cryptography
    by Chloe Martindale (University of Bristol, UK)

The course will cover the following topics:

Problem sessions will make heavy use of SageMath so do download and it and familiarise yourself with the basics in advance.

Bibliography
  1. Lorenz Panny, lecture notes written for a 2020/1 virtual isogeny school.
  2. Joseph H. Silverman, Arithmetic of Elliptic Curves.
  3. Laia Amoros, lecture notes written for a 2020/1 virtual isogeny school
  4. John Voight, Quaternion Algebras
  5. Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes, CSIDH: An Efficient Post-Quantum Commutative Group Action
  6. Wouter Castryck and Thomas Decru, CSIDH on the surface
  7. Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, and Francisco Rodríguez-Henríquez, The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents
  8. Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren, CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
  9. Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, and Benjamin Wesolowski, SQISign: compact post-quantum signatures from quaternions and isogenies
  10. Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski, SCALLOP: scaling the CSI-FiSh
  11. Steven Galbraith, blog post on Kani's irreducibility criterion
  12. Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski, SQIsignHD: New Dimensions in Cryptography
  13. Andrea Basso, Luciano Maino, and Giacomo Pope, FESTA: Fast Encryption from Supersingular Torsion Attacks

### Code-based cryptography
    by Thomas Debris-Alazard (Inria, France)
    and Maxime Bombar (CWI, Netherlands)

In this course, we will study linear codes and some of their applications to cryptography. Linear codes are subspaces of an n-dimensional space over a finite field. They were historically introduced to preserve the quality of information stored on a physical device or transmitted across a noisy channel. Yet surprisingly, linear codes are at the core of one of the first public-key encryption schemes, constructed by McEliece in 1978. McEliece’s scheme was not used in practice, despite having many advantages. But a few years later, Shor’s famous algorithm breaking RSA put it back in the spotlight: McEliece’s scheme turns out to be resistant against quantum attacks.

Our goal in this course will be to study linear codes from a cryptographic perspective. In particular, we will study the hardness of the decoding problem for random codes, the ideal problem from which to construct code-based cryptosystems. Our approach will be twofold: we will give evidence that the problem is hard via (worst-to-average case) reductions, and we will present the best algorithms to solve it (information set decoding algorithms and dual attacks). Then we will study McEliece's encryption scheme, and see that its security does not rely solely on the hardness of decoding random codes. Ultimately, we will present the lesser known Alekhnovich encryption scheme, a second way of building encryption schemes based on codes. We will demonstrate that, contrary to McEliece’s approach, Alekhnovich’s encryption scheme does not need any ad-hoc assumptions to ensure its security, and only relies on the hardness of decoding random codes.

### Multivariate cryptography
    by Simona Samardjiska (Radboud University, Netherlands)

The course will cover the following topics:

Part I: Design

I.1. Ad-hoc designs

I.2. Provably secure designs

Part II: Cryptanalysis

II.1. Algorithms for solving the MQ problem

II.2. Key-recovery through algebraic modelling

The only prerequisites are a basic course in linear and abstract algebra.


## Course material

### Lattice-based cryptography

### Isogeny-based cryptography

Code-based cryptography

Multivariate cryptography


## Student presentations

Thursday 27 Raul HernandezQuadratic Forms and the Class Group Silvia SconzaKnot-based Key Exchange protocol Eli OrvisCounting paths between oriented supersingular curves Roman LangrehrOn the Multi-user Security of LWE-Based NIKE Seong Eun JungModular symbols over function fields of elliptic curves
Tuesday 2 Kylie SchnoorConstructing Optimal Line Packings Nathan DalyQuantum popcorn solves all our problems: quantum approaches to the quadratic assignment problem Erin WilliamsModular Forms and Lehmer's Conjecture Sayantika MondalTowards a Curve Complex for Filling Curves
Friday 5 Krystal MaughanFoldable Schemes for Isogeny-Based Cryptography Phillip GajlandSwoosh: Efficient Lattice-Based Non-Interactive Key Exchange Maddy ParsonsAn Exploration into the Efficacy of Virtual Homework in an Introduction to Proofs Course

## What to do in Zürich?