STORK - Bart Preneel STORK - Strategic Roadmap for (K)Crypto A roadmap project in the European Commission’s IST Programme Bart Preneel, K.U.Leuven http://w w w .stork.eu.org Agenda of introductory session T Introduction to STORK T The 6th Framework Programme (Aniyan Varghese) T NESSIE: Overview 1
STORK - Bart Preneel The Need for FP6 Research Actions in Cryptology T privacy and security are critical success factors for the lift-off of novel applications and technologies T cryptology is a key building block T help Europe stay ahead T avoid fragmentation, proprietary solutions, technology lock-in situations T consistent approach, standardization Cryptology research (1) T area is strategic/interdisciplinary/scattered/complex T cryptographic algorithms S ad hoc and provable security S lightweight/low cost algorithms (e.g. stream ciphers) S new “from scratch” algorithms (e.g. one-way functions) S pseudo-random bit generators S public-key algorithms not based on factoring and discrete logarithm S design and validation (including building blocks) 2
STORK - Bart Preneel Cryptology research (2) T cryptographic protocols S complex settings & requirements: voting, privacy, auction, digital rights management S plug-and-play S entity authentication for extreme environments S dependability /survivability of heterog. wide-area systems S methodologies: reductions, formal methods T unconditionally secure cryptology S quantum models S noisy channels S public randomness New environments T low cost secure bus encryption T ambient intelligence T inexpensive transactions T smart cards T complex interactions T cryptography in a world where large quantum computers exist 3
STORK - Bart Preneel STORK: Objectives T identify gaps between state of the art in cryptology research and current and forthcoming requirements for cryptographic algorithms and techniques T develop shared agenda for research T build constituency S beyond the STORK consortium S consensus building process S prepare the ground for FP6 research actions STORK Partners T Kath. Univ. Leuven (CO), BE T Ecole Normale Supérieure, FR T Ruhr Universität Bochum, DE T Gemplus S.A., FR T Philips Semiconductors GmbH, DE T Vodafone Group Services Ltd, UK T Ericsson AB, SE T France Telecom, FR 4
STORK - Bart Preneel The EU’s Sixth Framew ork Programme T European research from 2003 to 2006 T focus on large-scale, high-impact actions: S Integrated Projects S Networks of Excellence T first calls for proposals mid December 2002, deadline mid April 2003 S http://www.stork.eu.org/fp6.html S http://www.cordis.lu STORK Approach new application constituency open research scenarios issues consensus technologies building, strategies/ consultation, priorities user demands dissemination (privacy vs. ease-of-use) timeline STORK 2003-2006 societal/ethical dimension FP6 legal/regulatory preparation issues 5
STORK - Bart Preneel Key Questions T on which areas should cryptology research concentrate in the next 5-10 years? T which other disciplines are needed for extra expertise? T which are the most important open problems in cryptology? STORK Deliverables T D2 EU Crypto competencies T D4 Status and new trends in cryptology T D5 Roadmap for cryptographic research T D6 List of open problems in cryptology T drafts are available on http://www.stork.eu.org/documents.html T Establish cryptography network 6
STORK - Bart Preneel Goal of this w orkshop T make progress with roadmap and open problems T investigate links with other research areas and applications T build constituency T explore how the cryptographic community should participate to FP6 Get Involved! T contribute to the discussions! T subscribe to our mailing list T contribute to our roadmap development T details at http://www.stork.eu.org T attend 2nd open workshop (organized together with NESSIE): February 26-27, 2003, Lund (S) 7
STORK - Bart Preneel Cryptology and its applications (disclaimer: this diagram does not include all relevant areas) NoE on cryptology? IP in Applications IP on Mobile •e-voting Smart •e-government cards •e-health protocols devi applic algorithms ces ations & modes Crypto models •computational limited •bounded storage •quantum •noisy channels bounded storage crypto quantum crypto Tuesday 26 November 2002 T 9h00-10h00: Introduction [Bart Preneel] T 10h00-10h30: Electronic signatures [Bart Preneel] T 10h30-11h00: coffee break T 11h00-12h00: Quantum Computing and Quantum Cryptography [Mats Näslund] T 12h00-12h15: Smart cards [Peter Roelse] T 12h15-13h45: lunch T 13h45-16h00: Public-Key Cryptography [Jacques Stern] T 16h00-16h30: coffee break T 16h30-17h30: Symmetric Cryptography [Steve Babbage] 8
STORK - Bart Preneel Wednesday 27 November 2002 T 9h00-10h00: Foundations [Louis Granboulan] T 10h00-11h30: Applications and Implementations [Helena Handschuh] T 10h30-11h00: coffee break T 11h30-12h15: Protocols [ Christof Paar] T 12h15-12h30: Concluding remarks T 12h30-14h00: lunch Tuesday, November 26 Dinner 19:30 De Brugse Hanze, Steenstraat 96 Aperitif House Cocktail Assorted Norwegian Smoked Fish Fillet of Beef with Choron Sauce and French Fries Fresh Exotic Fruit Salad with Whipped Cream Coffee and Sweets 9
Recommend
More recommend