{"id":748924,"date":"2020-05-28T19:07:57","date_gmt":"2020-05-29T02:07:57","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&#038;p=748924"},"modified":"2021-05-26T19:14:12","modified_gmt":"2021-05-27T02:14:12","slug":"post-quantum-cryptography-supersingular-isogenies-for-beginners","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/post-quantum-cryptography-supersingular-isogenies-for-beginners\/","title":{"rendered":"Post-quantum cryptography: Supersingular isogenies for beginners"},"content":{"rendered":"<p>A large-scale quantum computer would break the public key cryptography that is currently used to secure the internet. While scientists around the world are in a race to build quantum computers, cryptographers are frantically working to reinvent encryption in order to secure our digital world before that day comes.<\/p>\n<p>In this webinar led by Microsoft researcher Dr. Craig Costello, you will examine why post-quantum cryptography is so critical as we move closer to realizing quantum computing, and you will learn the basics of supersingular isogeny Diffie-Hellman (SIDH), which is one of the popular candidates for post-quantum key exchange. The best known classical and quantum algorithms for attacking the SIDH protocol have exponential runtimes, which is why SIDH has the lowest bandwidth requirements of all the post-quantum encryption candidates currently under scrutiny.<\/p>\n<p>Together, you\u2019ll explore:<\/p>\n<ul>\n<li>The motivation for post-quantum cryptography<\/li>\n<li>Foundational theory of elliptic curves and isogenies<\/li>\n<li>A step-by-step example of the SIDH protocol<\/li>\n<li>Where to find open source software for post-quantum cryptography<\/li>\n<\/ul>\n<p><strong>Resource list:<\/strong><\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/eprint.iacr.org\/2019\/1321.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Supersingular isogeny key exchange for beginners<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Tutorial)<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/sike\/\">Supersingular Isogeny Key Encapsulation (SIKE)<\/a> (Project page)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/github.com\/Microsoft\/PQCrypto-SIKE\" target=\"_blank\" rel=\"noopener noreferrer\">Download the code<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (GitHub)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/arxiv.org\/pdf\/1711.04062.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Read De Feo\u2019s more advanced lecture notes on the mathematics of isogeny-based cryptography<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/blog\/news-from-the-front-in-the-post-quantum-crypto-wars-with-dr-craig-costello\/\">News from the front in the post-quantum crypto wars<\/a> (Podcast)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ted.com\/talks\/craig_costello_in_the_war_for_information_will_quantum_computers_defeat_cryptographers\" target=\"_blank\" rel=\"noopener noreferrer\">Craig Costello: In the war for information, will quantum computers defeat cryptographers?<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (TED Talk)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/eprint.iacr.org\/2011\/506.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Read the original SIDH paper<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">Check out NIST\u2019s post-quantum standardization initiative<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/craigco\/\">Craig Costello<\/a> (Researcher profile)<\/li>\n<\/ul>\n<p>*This on-demand webinar features a previously recorded Q&A session and open captioning.<\/p>\n<p>This webinar originally aired on May 28, 2020<\/p>\n<p>Explore more Microsoft Research webinars: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/aka.ms\/msrwebinars\">https:\/\/aka.ms\/msrwebinars<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A large-scale quantum computer would break the public key cryptography that is currently used to secure the internet. While scientists around the world are in a race to build quantum computers, cryptographers are frantically working to reinvent encryption in order to secure our digital world before that day comes. In this webinar led by Microsoft [&hellip;]<\/p>\n","protected":false},"featured_media":748927,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13561,243138,13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-748924","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-algorithms","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/9B7jq7Mgiwc","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/748924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/748924\/revisions"}],"predecessor-version":[{"id":748930,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/748924\/revisions\/748930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/748927"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=748924"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=748924"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=748924"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=748924"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=748924"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=748924"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=748924"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=748924"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=748924"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=748924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}