While waiting for the final standards from the NIST Post-Quantum Competition, you can start preparing with a hybrid approach, combining post-quantum algorithms with traditional public key algorithms. In this workshop, Keyfactor’s David Hook and Roy Basmacier will look at several hybrid techniques as well as how they can be applied to the Bouncy Castle Java APIs, both FIPS and non-FIPS.
Get CPE Credits
Earn 0.5 CPE credit on this workshop. Keyfactor is an Approved (ISC)2 CPE Submitter Partner.
https://www.isc2.org/
Agenda
- Basic techniques and algorithms to use. The mechanisms for secret sharing in post-quantum encryption are based around Key Encapsulation Mechanisms (KEMs). We will start by looking at what is available and how they translate into the Java Cryptography Architecture.
- Post-quantum hybrid cryptography in the general Bouncy Castle APIs. Building on session 1, we will look at how KEMs can be applied to more classical key agreement and key transport mechanisms.
- Post-quantum hybrid cryptography in the Bouncy Castle FIPS APIs. Building further on session 2, we will look at how KEMs can be applied together with certified versions of classical algorithms.
What You Will Learn
After the workshop, you will have knowledge of the mechanisms that can be used in Java with the Bouncy Castle APIs for doing hybrid-cryptography to post-quantum harden classical approaches to encryption. You will be able to recognize which method is most appropriate to their situation and how to use hybrid approaches in a certified environment.
For documentation and exercises, see:
https://doc.primekey.com/bouncycastle/post-quantum-hybrid-cryptography-in-bouncy-castle
This workshop was also held live at the Keyfactor Community Tech Meetup in Stockholm on September 7, 2022.