Post-quantum cryptography: Supersingular isogenies for beginners

A large-scale quantum computer would break the public key cryptography that is currently used to secure the internet. While scientists around the world are in a race to build quantum computers, cryptographers are frantically working to reinvent encryption in order to secure our digital world before that day comes.

In this webinar led by Microsoft researcher Dr. Craig Costello, you will examine why post-quantum cryptography is so critical as we move closer to realizing quantum computing, and you will learn the basics of supersingular isogeny Diffie-Hellman (SIDH), which is one of the popular candidates for post-quantum key exchange. The best known classical and quantum algorithms for attacking the SIDH protocol have exponential runtimes, which is why SIDH has the lowest bandwidth requirements of all the post-quantum encryption candidates currently under scrutiny.

Together, you’ll explore:

  • The motivation for post-quantum cryptography
  • Foundational theory of elliptic curves and isogenies
  • A step-by-step example of the SIDH protocol
  • Where to find open source software for post-quantum cryptography

Resource list:

*This on-demand webinar features a previously recorded Q&A session and open captioning.

This webinar originally aired on May 28, 2020

Explore more Microsoft Research webinars: https://aka.ms/msrwebinars (opens in new tab)

Date:
Speakers:
Craig Costello
Affiliation:
Microsoft Research