Explore the words cloud of the QUASYModo project. It provides you a very rough idea of what is the project "QUASYModo" about.
The following table provides information about the project.
Coordinator |
INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE
Organization address contact info |
Coordinator Country | France [FR] |
Total cost | 1˙330˙463 € |
EC max contribution | 1˙330˙463 € (100%) |
Programme |
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC)) |
Code Call | ERC-2016-STG |
Funding Scheme | ERC-STG |
Starting year | 2017 |
Duration (year-month-day) | from 2017-09-01 to 2022-08-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE | FR (LE CHESNAY CEDEX) | coordinator | 1˙330˙463.00 |
As years go by, the existence of quantum computers becomes more tangible and the scientific community is already anticipating the enormous consequences of the induced breakthrough in computational power. Cryptology is one of the affected disciplines. Indeed, the current state-of-the-art asymmetric cryptography would become insecure, and we are actively searching for alternatives. Symmetric cryptography, essential for enabling secure communications, seems much less affected at first sight: its biggest known threat is Grover’s algorithm, which allows exhaustive key searches in the square root of the normal complexity. Thus, so far, it is believed that doubling key lengths suffices to maintain an equivalent security in the post-quantum world. The security of symmetric cryptography is completely based on cryptanalysis: we only gain confidence in the security of a symmetric primitive through extensive and continuous scrutiny. It is therefore not possible to determine whether a symmetric primitive might be secure or not in a post-quantum world without first understanding how a quantum adversary could attack it. Correctly evaluating the security of symmetric primitives in the post-quantum world cannot be done without a corresponding cryptanalysis toolbox, which neither exists nor has ever been studied. This is the big gap I have identified and that I plan to fill with this project. Next, doubling the key length is not a trivial task and needs to be carefully studied. My ultimate aim is to propose efficient solutions secure in the post-quantum world with the help of our previously obtained quantum symmetric cryptanalysis toolbox. This will help prevent the chaos that big quantum computers would generate: being ready in advance will definitely save a great amount of time and money, while protecting our current and future communications. The main challenge of QUASYModo is to redesign symmetric cryptography for the post-quantum world.
year | authors and title | journal | last update |
---|---|---|---|
2018 |
Thomas Fuhr, MarÃa Naya-Plasencia,Yann Rotella State-Recovery Attacks on Modified Ketje Jr published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2018.i1.29-56 |
IACR Trans. Symmetric Cryptol. | 2019-05-27 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "QUASYMODO" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "QUASYMODO" are provided by the European Opendata Portal: CORDIS opendata.
Reprogramming Conformation by Fluorination: Exploring New Areas of Chemical Space
Read MoreMotor cortical beta bursts for movement planning and evaluation: Mechanisms, functional roles, and development
Read MoreRedefining the esophageal stem cell niche – towards targeting of squamous cell carcinoma
Read More