It is frequently said that a strategy is as strong as its weakest link. But what does it mean in terms of cryptography?
How do we quantify the strength of cryptographic algorithms that are being used? Where are the weakest links?
This presentation is going to answer any of those questions but besides rise others like are we OK if we just stick with NIST cryptography standards? We will start with discussing basic definitions of cryptographic safety levels and will see how those map into main classes of symmetric cryptographic algorithms and discuss examples of nonobvious limitations of any of the algorithms.
Then, we will decision on to asymmetric constructions and will effort to establish meaningful ways of estimating strength of specified constructions. But what about quantum attacks? Taking into account fresh adversarial capabilities changes a lot in the model by drastically changing safety levels of existing cryptographic algorithms but besides introducing new, comparatively little studied classes of algorithms of "post-quantum" cryptography.
We will explain those changes and will discuss most popular classes like lattice-based constructions. Finally, taking as an example hash-based signatures we will show how parameter choices influence overall levels of safety and discuss "interesting" choices recommended by fresh industry-relevant guidance documents.
More: https://confidence-conference.org/