Designing Quantum Resistant Key Exchange Protocols with CPSA

Edward Zieglar
CSEE Department
UMBC

12:00noon–1pm
Friday, April 15, 2022
Remotely via WebEx: https://umbc.webex.com/meet/sherman

Recording of Talk.

Abstract:

With developments in quantum computers and algorithms, the public-key systems that we rely upon for secure network communication will become vulnerable to exploitation. Quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols. Much of the work has focused on developing new mathematical problems that are conjectured to be quantum-resistant as replacements for our current public-key algorithms. We took a different approach, looking to an old secret-key agreement protocol developed by Leighton and Micali at MIT for the Clipper Chip symmetric encryption system. We will present our analysis of the Leighton-Micali key agreement protocol, weaknesses we uncovered with the Cryptographic Protocol Shapes Analyzer (CPSA), and verification of a new protocol based on their ideas that corrects deficiencies in the original protocol.

About the Speaker:

Dr. Zieglar is an expert in protocol analysis and computer security at the National Security Agency. He is an adjunct faculty member at UMBC and a member of the UMBC Protocol Analysis Lab. Dr. Zieglar earned his PhD in computer science from UMBC working under Dr. Sidhu.

Email: eziegl1@umbc.edu

Host:

Alan T. Sherman, sherman@umbc.edu

Upcoming CDL Meetings:

Apr 29, Ian Blumenfeld (UMBC)
May 13, Enka Blanchard (Digitrust Loria, France)

 

Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.

The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public.