U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Presentation

Attacks Cost Models

February 23, 2022

Presenters

Ray Perlner - NIST

Description

Abstract: In determining which cryptosystems to use and what parameter choices to make for those cryptosystems, a major criterion is the concrete security of the cryptosystem and parameter set (i.e. the complexity of the cheapest attack.) Ideally, the concrete security could be expressed in a single number, like 128 bits of security, 192 bits of security etc. However, often in attempting to do this we find ourselves making assumptions about the relative cost of classical operations, quantum operations, memory, memory bandwidth, hardware, wall-clock time, energy etc. This talk will draw upon the experience of the NIST Postquantum Cryptography (PQC) standardization process to give examples of the issues that come up when trying to compare the concrete security of very dissimilar schemes, and the various approaches that have been suggested to resolve these issues.

Presented at

Crypto Reading Club talk on 2022-Feb-23

Parent Project

See: Crypto Reading Club

Related Topics

Security and Privacy: cryptography

Created June 29, 2022