31.01.16 - 05.02.16, Seminar 16051

Modern Cryptography and Security: An Inter-Community Dialogue

Diese Seminarbeschreibung wurde vor dem Seminar auf unseren Webseiten veröffentlicht und bei der Einladung zum Seminar verwendet.

Motivation

In the past few decades, two mostly distinct communities have taken shape under the broader information assurance umbrella: a theoretical community – mainly working on foundational aspects of cryptography, and a systems security community – focused on building secure systems.

Today, these two communities form an important part of the world of cyber security research and are essentially interdependent. The systems community requires the strengths and foundational insights of the theoreticians. The theoretical community needs relevant problems to work on.

Yet, despite this intrinsic potential synergy, as well as the plethora of significant cyber security problems of clear mutual interest, few points of intersection and dialogue exist between the two communities. They continue to publish and meet in mostly separate venues and work on disjoint problems for years before the occasional transfer of knowledge.

This seminar, organized by members of both communities aims to change that and initiate a discussion between the system security researchers and the cryptographic foundations explorers, centered around a set of key topics of high modern relevance and interest in cyber security, including, but not limited to: MPC: secure multi-party computation, HE: homomorphic encryption, post-quantum crypto, side/covert channels, leakage and virtualization security, secure outsourcing, secure hardware design, anti-surveillance/anti-censorship systems, program obfuscation and a number of other topics to be established in the beginning of the seminar.

Ultimately, the major goal of the seminar is to bring together the theoretical cryptography and security systems research communities for an intense cross-domain dialogue.

Security/systems researchers should go home having found out and understood more cryptographic constructs. Theoretical cryptography researchers should go home having been exposed to a set of new problems that appear in practice.

Given the recent important advancements in both theoretical cryptography and system security, it is time for a focused mutual exchange of ideas across research communities to set up the theoretical and practical foundations for cybersecurity in the decades to come.