Post Quantum Cryptography Training in South Africa

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Fundamentals
  • Price: From €5,395+VAT
We can host this training at your preferred location. Contact us!

Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.

Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.

Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.

High Level Overview of the class topics;

  • Introduction to post-quantum cryptography
  • Attacks on DLOG and factoring
  • Lattices and related algorithms
  • LWE and Regev's encryption scheme
  • NTRU and NTRUPrime
  • Codes and cryptosystems
  • Isogenies and elliptic curves
  • MQ problem and its variants
  • Other candidates for PQC
  • Side-channel attacks and countermeasures

General knowledge of cryptography.

You will;

  • Be able to evaluate the security of different cryptographic primitives
  • Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
  • Have practical experience implementing and using post-quantum cryptographic schemes
  • Understand the mathematical foundations of post-quantum cryptography
  • Be familiar with the state-of-the-art in post-quantum cryptography
  • Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations

Day 1

Intro

Attacks Against DLOG and Factoring

  • Shor's Algorithm
  • NIST Competition

Lattices

  • Definitions
  • SVP, CVP, BDD
  • Good and Bad Basis
  • Babai Nearest Plane Algorithm
  • GGH Schemes and Attack Against Digital Signature Scheme
  • LWE
  • Regev's Encryption Scheme
  • Key Exchange from LWE
  • Ring LWE
  • Module LWE and LWR
  • Frodo, Kyber, Saber
  • NTRU and NTRUPrime
  • SIS Problem, Hash Function, and Digital Signature from SIS
  • Falcon
  • Lyubashevskys's ID Scheme
  • Dilithium
  • IBE and FHE

Day 2

Codes

  • Error Correcting Codes in General
  • Goppa Codes, Decoding Algorithm
  • McEliece Cryptosystem, Cryptanalysis History
  • BIKE and HQC
  • Niederreiter Cryptosystem, Syndrome Decoding
  • Trapdoor One-Way Function
  • Digital Signature Scheme Wave
  • Rank Metric Codes and Cryptosystems

Isogenies

  • Crash Course on Isogenies and Elliptic Curves
  • CGL Hash Function and SIDH
  • Security of SIDH, SIKE
  • Group Actions, CSIDH, and Applications
  • SQISign (High-Level Discussion)

Day 3

MQ

  • MQ Problem
  • Discussion about Its Hardness
  • Linearization, Gröbner Basis (High-Level Discussion)
  • Benchmarking Systems
  • Imai-Matsumoto, Hidden Field Equations
  • Variants of HFE
  • Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
  • Rainbow and Cryptanalysis Results for Both UOV and Rainbow
  • ID Scheme and GeMSS

Other Candidates

  • Hash-Based Signatures (SPHINCS+)
  • MPC-in-the-Head Signatures (Picnic)

Side-Channel Attacks

  • Basic Attacks
  • Countermeasures Against Physical and Implementation Attacks


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

12 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
23 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
12 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
06 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
09 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
23 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
21 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
23 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom

Related Trainings

Post Quantum Cryptography Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.