Crypto Conference Goes Quantum around High Performance Computing

15/06/2016

News image

After several successful conferences, The Cyber Academy is setting up a conference on one of the most challenging areas of technology: cryptography. It will run on 21 September 2016.  More details here:

http://thecyberacademy.org/crypto

It aims to discuss some of the major issues involved in encryption, including with the usage of high performance computing to crack cryptography, and in law enforcement and industry challenges. It includes:

  • Quantum Computers, Prof Alan Woodward. In this talk we will take a rapid look at how conventional computing has developed in it’s power and the limitations that we are rapidly approaching. One answer to the limitations of silicon based conventional computing is the development of quantum computers. We will introduce the basic quantum physical principles behind quantum computers, and talk about some of the candidate technologies that are competing for the crown.  We will give a gentle introduction to a specific quantum algorithm (Shor’s algorithm) and explain why it has some profound implications for the current, most popular encryption schemes that we all rely upon daily.
  • Cracking RSA and Next Generation Cryptography, Prof Bill Buchanan. This will include a practical demonstration on how high performance computers and quantum computers can be setup to crack methods such as for RSA, and provides a demonstration of new quantum robust methods. There will be full demonstrations and a simplified overview of the new cryptography methods which would be relevant to protect cryptography from cracking within high performance environments, including to be resistant against cracking from quantum computers.
  • Practical side-channel attacks on embedded device cryptography, Doug Carson, Dr Owen Lo, and Charley Celice. This presentation outlines the methods of monitoring devices for their electrical power drain and radio emissions, in order to determine both the classifications of the encryption method and the encryption key. It will provide practical demonstration of cracking cryptography from monitoring things like the electrical power drain, the radio wave emission, and from monitoring input/output ports, such as from the audio port.
  • Cryptography and High Performance Computing, Emerson Lima, CEO Founder at Praelium security.

Bio

Alan Woodward began as a physicist. However, he developed an interest in computing early on through signal processing for gamma ray burst detectors, and so switched to engineering after his BSc. His post graduate research at the Institute of Sound and Vibration Research (ISVR), University of Southampton, was in adaptive filtering, and novel methods of recovering corrupted signals. Alan also worked on novel methods of noise cancellation, both passive and active.

After leaving the ISVR Alan worked for the UK government for many years, for whom he still provides advice through his industrial activities. He has particular expertise in, and continues to conduct research into, cyber security, covert communications, forensic computing and image/signal processing. Alan has been involved in some of the most significant advances in computer technology which have seen him elected as a Fellow and chartered member of the British Computer Society, Institute of Physics and the Royal Statistical Society.

In addition to his academic and government work, Alan has run businesses focussed on various aspects of Information Technology (IT). In 2000 Alan was pivotal in the flotation of Charteris plc on the London Stock Exchange. He remained a director until 2008 at which point he began to focus back on his academic interests. Alan continues to be a director on businesses involved in IT.

Although Alan has been at the leading edge of technology development for many years, he is primarily a particularly good communicator. He is known for his ability to communicate complex ideas in a simple, yet passionate manner. He not only publishes in the academic and trade journals but has articles in the national press and comments on TV and radio. Despite the length of his experience, his hands-on ability with emerging technologies contributes significantly to the respect he is repeatedly shown when he leads teams where technology is involved.

Alan is very active on social media and he can be reached at the following:

 
[Read More]

Associated people

Peter Aaby
Research student
p.aaby@napier.ac.uk
+44 131 455
Charley Celice
Researcher
c.celice@napier.ac.uk
+44 131 455
Marian Dunbar
Administrator
M.Dunbar@napier.ac.uk
+44 131 455 2711
Naghmeh Moradpoor
Lecturer in Cybersecurity and Networks
N.Moradpoor@napier.ac.uk
+44 131 455 2596
William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759
Lynn Crawford
Project Manager (Cyber Academy)
L.Crawford@napier.ac.uk
+44 131 455 2635
Richard Macfarlane
Lecturer
r.macfarlane@napier.ac.uk
+44 131 455 2335
Cyber-Security
Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Resources