logo
episode-header-image
Sep 2020
35m 43s

Episode 1: Post-Quantum TLS With KEMs In...

Symbolic Software
About this episode

TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is its potential for resistance to attacks that utilize quantum computing – computers that, theoretically, could factor the products of large primes and solve the discrete logarithm problem in relatively short periods of time, significantly affecting the security of TLS 1.3.

Today however, we’re discussing an interesting new paper, to be published at this year’s ACM CCS, which introduces KEMTLS: a modified version of TLS 1.3 that uses Key Encapsulation Mechanisms, or KEMs, instead of signatures for server authentication, thereby providing a sort of “post-quantum TLS”.

But what even are KEMs? Are quantum computers even a thing that we should be worried about? On the first ever episode of Cryptography FM, we’ll be hosting Dr. Douglas Stebila and PhD Candidate Thom Wiggers to discuss these questions and more.

Dr. Douglas Stebila is an Associate Professor of cryptography in the Department of Combinatorics & Optimization at the University of Waterloo in Waterloo, Ontario, Canada. His research focuses on improving the security of key exchange protocols and Internet cryptography protocols such as TLS and SSH, including the development of quantum-resistant solutions. His previous work on the integration of elliptic curve cryptography in TLS has been deployed on hundreds of millions of web browsers and servers worldwide.

Thom Wiggers is a PhD Candidate at the Institute of Computing and Information Sciences at Radboud University in The Netherlands. He is working on the interactions of post-quantum cryptography with protocols, under the supervision of Dr. Peter Schwabe, who is also a co-author of the research work that we’re going to discuss today.

Links to discussed papers:

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guests: Douglas Stebila and Thom Wiggers.

Sponsored By:

Up next
Feb 2023
Episode 24: CryptoHack's Collection of Cryptic Conundrums!
For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and a ... Show More
49m 18s
Jan 2023
Episode 23: Psychic Signatures in Java!
On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatu ... Show More
53m 20s
Jan 2023
Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!
Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been w ... Show More
52m 12s
Recommended Episodes
Aug 2023
Quantum computing: A threat to asymmetric encryption.
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the meaning of quantum computing through a cybersecurity perspective with CyberWire Hash Table guests Dr. Georgian Shea, Chief Technologist at the Foundation for Defense of Democracies, and Jonathan Fr ... Show More
17m 33s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Mar 2023
The quantum revolution: Q-Day
In the cybersecurity world they call it Q-Day, the day when a quantum computer will be built that can break the encryption of the internet. John Thornhill and Madhumita Murgia speak to cybersecurity expert and former professional hacker Mark Carney about password cracking, and wh ... Show More
26m 4s
Sep 2022
How to Protect your Data in the Quantum Era ?
Podcast with Gautam Siwach and Jin Vanstee ! Speaker - Thomas Harrer , Thomas is an IBM distinguished engineer and CTO for server storage in Europe, Middle East and Africa. His experience is around Hybrid Cloud & AI Platform, Infrastructure for mission critical systems, Cyber Res ... Show More
12m 43s
Nov 2022
Quantum technology gathers pace
This month’s episode of the Physics World Stories podcast looks in depth at the science behind the 2022 Nobel Prize for Physics and the technologies that are emerging as a result. Alain Aspect, John Clauser and Anton Zeilinger shared this year’s award “for their experiments with ... Show More
43m 38s
Mar 2021
S15:E6 - What is cryptography and how to get into it (Marcus Carey)
In this episode, we talk about cryptography with Marcus Carey, enterprise architect at ReliaQuest. Marcus talks about going to the military and learning cryptography, what cryptography is, and the foundational things you need to know in order to make sure the apps you’re building ... Show More
35m 36s
Jul 2022
Babbage: How to keep secrets in the age of quantum computing
The age of quantum computing is coming closer, presenting both an opportunity and a risk for individuals, companies and governments. Host Alok Jha explores why quantum computers threaten to crack the codes that keep data and communications secure over the internet. We also invest ... Show More
40m 19s
Jun 2024
Quantum Computing and Cybersecurity – Examining Trends and Implications
The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts of data and solve complex problems at an unprecedented speed, quantum computing holds great promise for new material discovery thro ... Show More
39m 31s