THEMATIC PROGRAMS

November 27, 2014

Fall 2006
Thematic Program in Cryptography

Organizing Committee:
Ian F. Blake (Toronto)
Alfred Menezes (Waterloo)
Michele Mosca (Waterloo and Perimeter Institute)
Kumar Murty (Toronto)

Renate Scheidler (Calgary)
Andreas Stein (Wyoming)
Ramarathnam Venkatesan (Microsoft Research)
Hugh Williams (Calgary) -Committee Chair

National Science Foundation

Ambassade de France au Canada

Program Outline

Cryptography and cryptographic protocols have become a key element of information systems, protecting data and communications to ensure confidentiality, integrity and authenticity of data. While most symmetric key systems (block ciphers such as DES and AES and stream ciphers) have relatively modest mathematical requirements, asymmetric or public key systems, as well as cryptographic protocols, have become increasingly mathematically sophisticated. Such systems rely for their security on the difficulty of specific mathematical problems such as integer factorization and the modular discrete logarithm problem.

It is important, however, to emphasize that no rigorous mathematical proof of security has ever been given for any of these systems. The difficulty of these problems is usually established anecdotally through frequent and unsuccessful attempts by specialists to provide computationally efficient solutions to them. Indeed, several problems thought to be very difficult, such as the integer factorization problem, have been shown to be somewhat less to considerably less intractable than previously believed. Furthermore, the possibility of quantum computing becoming practical would change this picture dramatically. If realized, most of the problems on which the security of public key cryptosystems rely drop from exponential complexity to polynomial, rendering currently deployed cryptographic systems useless. While the likelihood of this occurring in the short term is remote, this is an exciting area of research which may well lead to revolutionary advances in computation and secure information communication.

This program will engage the cryptographic and mathematical communities in Canada and abroad to increase awareness of recent developments in these fields and to initiate a greater degree of collaboration in attacking the important problems, particularly on the boundaries.

The specific areas of concentration will be:

  • quantum computing and quantum cryptography
  • algebraic curves and cryptography
  • computational challenges arising in algorithmic number theory and cryptography
  • unconditionally secure cryptography
  • cryptographic protocols
  • applied aspects of cryptography

The program will include series of one-week workshops, Graduate courses and distinguished lecturers. The scope of the program is ambitious in that it aims to bring together researchers from areas that seldom have the opportunity to interact in an atmosphere where problems at the intersections can be explored. Developments in certain areas of mathematics (for example, number theory, combinatorics, algebraic geometry, non-abelian groups and rings) and in cryptography are both numerous and rapid; however, it is often the case that lack of contacts and communication between cryptographers and mathematicians presents obstacles in achieving significant advances on both sides. The aim is to overcome these obstacles and foster new links between both areas.

This program is being coordinated with a related but distinct program at IPAM, on the topic of "Securing Cyberspace"
(see www.ipam.ucla.edu/programs/sc2006/ ).

Associated program activities include the Rocky Mountain Mathematics Consortium's Summer School on Computational Number Theory and Applications to Cryptography, to be held June 19 - July 7, 2006 at the University of Wyoming, in Laramie, Wyoming. In particular, the summer school courses will complement and prepare participants for the activities of the Fields cryptography program.

Program Workshops and Events

Seminars
Number Theory and Cryptography Research Seminar
Number Theory Seminar on Modular Curves
Open Image Theorems
For I-ADIC Representations associated to Elliptic Curves

Cryptography Participants Seminar

ECC 2006 will be the 10th in a series of annual workshops dedicated to the study of elliptic curve cryptography and related areas. Over the past years the ECC conference series has broadened its scope beyond elliptic curve-based cryptography and now covers a wide range of areas within modern cryptography. For instance, past ECC conferences included presentations on hyperelliptic curve cryptography, pairing-based cryptography, quantum key distribution, AES, implementation issues, and deployments (e.g., cryptography for travel documents). At the same time ECC continues to be the premier conference on elliptic curve cryptography. It is hoped that ECC 2006 will further our mission of encouraging and stimulating research on the security and implementation of elliptic curve cryptosystems and related areas, and encouraging collaboration between mathematicians, computer scientists and engineers in the academic, industry and government sectors. As with past ECC conferences, there will be about 15 invited lectures (and no contributed talks) delivered by internationally leading experts. There will be both state-of-the-art survey lectures as well as lectures on latest research developments.

Apply to the Program

All scientific events are open to the mathematical sciences community. Visitors who are interested in office space or funding are requested to apply by filling out an application form. Additional support is available (pending NSF funding) to support junior US visitors to this program. Deadline to apply was November 20.

Fields scientific programs are devoted to research in the mathematical sciences, and enhanced graduate and post-doctoral training opportunities. Part of the mandate of the Institute is to broaden and enlarge the community, and to encourage the participation of women and members of visible minority groups in our scientific programs.

Back to Top