News, news analysis, and commentary on the latest trends in cybersecurity technology.
New Competition Focuses on Hardening Cryptosystems
The Technology Innovation Institute’s year-long cryptographic challenges invite participants to assess the concrete hardness of McEliece public-key encryption scheme.
The Technology Innovation Institute (TII), a global scientific research center and the applied research pillar of Abu Dhabi’s Advanced Technology Research Council, has launched a series of cryptography challenges aimed at evaluating the McEliece cryptosystem. TII will publish multiple McEliece-based cryptanalysis problems focused on theoretical key recovery algorithms, practical key recovery, and message recovery.
The McEliece cryptosystem is an asymmetric encryption algorithm that uses randomization in the encryption process. While the algorithm is not as widely used as other asymmetric encryption schemes, it is a fourth-round candidate (Classic McEliece Submission) of the current NIST PQC standardization effort for post-quantum secure schemes because it is immune to some types of attacks.
Participants in the year-long challenges will be able to validate the security of the McEliece cryptosystem and identify possible weaknesses, TII said. The competition will focus on innovative approaches to test the McEliece cryptosystem as a leading candidate for post-quantum encryption.
"TII’s challenges aim to strengthen the understanding of cryptosystems that are used globally on a daily basis to protect the privacy of individuals and corporations and keep their conversations and data confidential," the center said.
The TII McEliece Challenges are open to individuals, students, scientists, cryptographers, researchers, and subject matter experts – pretty much anyone with an interest in cryptography. Winners are paid out of a prize pool of $75,000. Preregistration is open, and submission forms will be available online May 23.
Read more about:
DR Global Middle East & AfricaAbout the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024