<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title>Douglas Stebila</title>
		<description>Douglas Stebila&apos;s website</description>
		<link>http://www.douglas.stebila.ca</link>
		<atom:link href="http://www.douglas.stebila.ca/blog/feed/rss-2.0.xml" rel="self" type="application/rss+xml" />
		
<item>
	<title>Research paper: Split-key PRFs and extended hybrid security for KEM combiners</title>
	<dc:creator>Lise Millerjord, Douglas Stebila, Camryn Steckel</dc:creator>
	<description>Abstract: Key encapsulation mechanism (KEM) combiners allow for the construction of hybrid KEMs that are secure as long as at least one of several underlying ingredient KEMs remains secure. In PKC 2018, Giacon, Heuer, and Poettering showed that parallel KEM combiners whose core function is a split-key pseudorandom function (PRF) satisfy IND-CCA security if at least one of the ingredient KEMs satisfies IND-CCA security. However, their result assumes that public keys of the combined KEM are generated independently from any instances of the ingredient KEMs, which may not hold in real-world applications. To address this, we introduce a new security model which captures adversarial access to both the combined KEM and (post-processed versions of) the ingredient KEMs. We show that security in this extended model can still be achieved if at least one ingredient KEM satisfies IND-CCA security, the core function is a split-key PRF, and the ingredient KEM outputs are post-processed using standard PRFs. We consider an application of this approach to hybrid KEMs in the S/MIME secure email standard. We also provide a new construction for a split-key PRF, which uses a t-resilient extractor to output a string of truly random bits from an input in which the adversary controls t bits, and show that this split-key PRF construction is secure in the standard model.</description>
	<pubDate>Thu, 08 Jan 2026 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/CIC-MilSteSte26</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/CIC-MilSteSte26</guid>
</item>

		
<item>
	<title>Research paper: FrodoKEM: A CCA-secure learning with errors key encapsulation mechanism</title>
	<dc:creator>Lewis Glabush, Patrick Longa, Michael Naehrig, Chris Peikert, Douglas Stebila, Fernando Virdia</dc:creator>
	<description>Abstract: &lt;p&gt;Large-scale quantum computers capable of implementing Shor&apos;s algorithm pose a significant threat to the security of the most widely used public-key cryptographic schemes. This risk has motivated substantial efforts by standards bodies and government agencies to identify and standardize quantum-safe cryptographic systems. Among the proposed solutions, lattice-based cryptography has emerged as the foundation for some of the most promising protocols.&lt;/p&gt;&lt;p&gt;This paper describes FrodoKEM, a family of conservative key-encapsulation mechanisms (KEMs) whose security is based on generic, “unstructured” lattices. FrodoKEM is proposed as an alternative to the more efficient lattice schemes that utilize algebraically structured lattices, such as the recently standardized ML-KEM scheme. By relying on generic lattices, FrodoKEM minimizes the potential for future attacks that exploit algebraic structures while enabling simple and compact implementations. Our plain C implementations demonstrate that, despite its conservative design and parameterization, FrodoKEM remains practical. For instance, the full protocol at NIST security level 1 runs in approximately 0.97 ms on a server-class processor, and 4.98 ms on a smartphone-class processor.&lt;/p&gt;&lt;p&gt;FrodoKEM obtains (single-target) IND-CCA security using a variant of the Fujisaki-Okamoto transform, applied to an underlying public-key encryption scheme called FrodoPKE. In addition, using a new tool called the Salted Fujisaki-Okamoto (SFO) transform, FrodoKEM is also shown to tightly achieve multi-target security, without increasing the FrodoPKE message length and with a negligible performance impact, based on the multi-target IND-CPA security of FrodoPKE.&lt;/p&gt;</description>
	<pubDate>Tue, 07 Oct 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/CIC-GLNPSV25</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/CIC-GLNPSV25</guid>
</item>

		
<item>
	<title>Photo gallery: UK • 2025</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: UK • 2025</description>
	<pubDate>Fri, 09 May 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2025-uk</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2025-uk</guid>
</item>


		
<item>
	<title>Photo gallery: Bulgaria • 2025</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Bulgaria • 2025</description>
	<pubDate>Sat, 22 Mar 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2025-bulgaria</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2025-bulgaria</guid>
</item>


		
<item>
	<title>Photo gallery: Spain • 2025</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Spain • 2025</description>
	<pubDate>Thu, 01 May 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2025-spain</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2025-spain</guid>
</item>


		
<item>
	<title>Research paper: FrodoKEM: key encapsulation from learning with errors</title>
	<dc:creator>Patrick Longa, Joppe W. Bos, Stephan Ehlen, Douglas Stebila</dc:creator>
	<description>Abstract: This internet draft specifies FrodoKEM, an IND-CCA2 secure Key Encapsulation Mechanism (KEM).</description>
	<pubDate>Sat, 13 Sep 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/draft-longa-cfrg-frodokem</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/draft-longa-cfrg-frodokem</guid>
</item>

		
<item>
	<title>Research paper: Verifiable decapsulation: recognizing faulty implementations of post-quantum KEMs</title>
	<dc:creator>Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Cryptographic schemes often contain verification steps that are essential for security. Yet, faulty implementations missing these steps can easily go unnoticed, as the schemes might still function correctly. A prominent instance of such a verification step is the re-encryption check in the Fujisaki-Okamoto (FO) transform that plays a prominent role in the post-quantum key encapsulation mechanisms (KEMs) considered in NIST&apos;s PQC standardization process. In KEMs built from FO, decapsulation performs a re-encryption check that is essential for security, but not for functionality. In other words, it will go unnoticed if this essential step is omitted or wrongly implemented, opening the door for key recovery attacks. Notably, such an implementation flaw was present in HQC&apos;s reference implementation and was only noticed after 19 months.&lt;/p&gt; &lt;p&gt;In this work, we develop a modified FO transform that binds re-encryption to functionality, ensuring that a faulty implementation which skips re-encryption will be exposed through basic correctness tests. We do so by adapting the verifiable verification methodology of Fischlin and Günther (CCS 2023) to the context of FO-based KEMs. More concretely, by exporting an unpredictable confirmation code from the public key encryption and embedding it into the key derivation function, we can confirm that (most of) the re-encryption step was indeed performed during decapsulation. We formalize this concept, establish modified FO transforms, and prove how unpredictable PKE confirmation codes turn into noticeable correctness errors for faulty implementations. We show how to apply this technique to ML-KEM and HQC, both with negligible overhead, by leveraging the entropy lost through ciphertext compression or truncation. We confirm that our approach works through mathematical proofs, as well as experimental data. Our experiments show that the implementation flaw in HQC&apos;s reference implementation indeed makes basic test cases when following our approach.&lt;/p&gt;</description>
	<pubDate>Sun, 17 Aug 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-GGHS25</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-GGHS25</guid>
</item>

		
<item>
	<title>Research paper: ProofFrog: a tool for verifying game-hopping proofs</title>
	<dc:creator>Ross Evans, Matthew McKague, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Cryptographic proofs allow researchers to provide theoretical guarantees on the security that their constructions provide. A proof of security can completely eliminate a class of attacks by potential adversaries. Human fallibility, however, means that even a proof reviewed by experts may still hide flaws or outright errors. Proof assistants are software tools built for the purpose of formally verifying each step in a proof, and as such have the potential to prevent erroneous proofs from being published and insecure constructions from being implemented.&lt;/p&gt; &lt;p&gt;Unfortunately, existing tooling for verifying cryptographic proofs has found limited adoption in the cryptographic community, in part due to concerns with ease of use. We present ProofFrog: a new tool for verifying cryptographic game-hopping proofs. ProofFrog is designed with the average cryptographer in mind, using an imperative syntax similar to C for specifying games and a syntax for proofs that closely models pen-and-paper arguments. As opposed to other proof assistant tools which largely operate by manipulating logical formulae, ProofFrog manipulates abstract syntax trees (ASTs) into a canonical form to establish indistinguishable or equivalent behaviour for pairs of games in a user-provided sequence. We also detail the domain-specific language developed for use with the ProofFrog proof engine, the exact transformations it applies to canonicalize ASTs, and case studies of verified proofs. A tool like ProofFrog that prioritizes ease of use can lower the barrier of entry to using computer-verified proofs and aid in catching insecure constructions before they are made public.&lt;/p&gt;</description>
	<pubDate>Wed, 05 Mar 2025 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-EvaMcKSte25</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-EvaMcKSte25</guid>
</item>

		
<item>
	<title>Research paper: Hybrid obfuscated key exchange and KEMs</title>
	<dc:creator>Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch</dc:creator>
	<description>Abstract: &lt;p&gt;Hiding the metadata in Internet protocols serves to protect user privacy, dissuade traffic analysis, and prevent network ossification. Fully encrypted protocols require even the initial key exchange to be obfuscated: a passive observer should be unable to distinguish a protocol execution from an exchange of random bitstrings. Deployed obfuscated key exchanges such as Tor&apos;s pluggable transport protocol obfs4 are Diffie–Hellman-based, and rely on the Elligator encoding for obfuscation. Recently, Günther, Stebila, and Veitch (CCS &apos;24) proposed a post-quantum variant pq-obfs, using a novel building block called obfuscated key encapsulation mechanisms (OKEMs): KEMs whose public keys and ciphertexts look like random bitstrings.&lt;/p&gt; &lt;p&gt;For transitioning real-world protocols, pure post-quantum security is not enough. Many are taking a hybrid approach, combining traditional and post-quantum schemes to hedge against security failures in either component. While hybrid KEMs are already widely deployed (e.g., in TLS 1.3), existing hybridization techniques fail to provide hybrid obfuscation guarantees for OKEMs. Further, even if a hybrid OKEM existed, the pq-obfs protocol would still not achieve hybrid obfuscation.&lt;/p&gt; &lt;p&gt;In this work, we address these challenges by presenting the first OKEM combiner that achieves hybrid IND-CCA security with hybrid ciphertext obfuscation guarantees, and using this to build Drivel, a modification of pq-obfs that is compatible with hybrid OKEMs. Our OKEM combiner allows for a variety of practical instantiations, e.g., combining obfuscated versions of DHKEM and ML-KEM. We additionally provide techniques to achieve unconditional public key obfuscation for LWE-based OKEMs, and explore broader applications of hybrid OKEMs, including a construction of the first hybrid password-authenticated key exchange (PAKE) protocol secure against adaptive corruptions in the UC model.&lt;/p&gt;</description>
	<pubDate>Sun, 17 Aug 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-GRSV25</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-GRSV25</guid>
</item>

		
<item>
	<title>Research paper: On the multi-target security of post-quantum key encapsulation mechanisms</title>
	<dc:creator>Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Practical deployments of key encapsulation mechanisms (KEMs) may entail large servers each using their public keys to communicate with potentially millions of clients simultaneously. While the standard IND-CCA security definition for KEMs considers only a single challenge public key and single challenge ciphertext, it can be relevant to consider multi-target scenarios where the adversary aims to break one of many challenge ciphertexts, for one of many challenge public keys. Many post-quantum KEMs have been built by applying the Fujisaki-Okamoto (FO) transform to a public key encryption (PKE) scheme. Although the FO transform incurs only a few bits of security loss for the standard, single-challenge IND-CCA property, this does not hold in the multi-target setting. Attacks have been identified against standards-track FO-based KEMs with 128-bit message spaces (FrodoKEM-640 and HQC-128) which become feasible if the adversary is given many challenge ciphertexts. These attacks exploit the deterministic encryption induced by the FO transform which allows the IND-CCA experiment to be reduced to a search problem on the message space, which in some cases may not be large enough to avoid collisions between pre-computation and challenge values. A cost effective way to amplify the hardness of this search problem is to add a random but public salt during encapsulation. While revised versions of FrodoKEM and HQC have used salts, there has been no proof showing that salting provides multi-ciphertext security. In this work, we formally analyze a salted variant of the Fujisaki-Okamoto transform, in the classical and quantum random oracle model (ROM); for the classical ROM, we show that multi-target IND-CCA security of the resulting KEM tightly reduces to the multi-target IND-CPA security of the underlying PKE. Our results imply that, for FrodoKEM and HQC at the 128-bit security level, replacing the FO transform with the salted variant can recover 62 bits of multi-target security, at the cost of a very small overhead increase.&lt;/p&gt;</description>
	<pubDate>Fri, 03 Oct 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-GlaHovSte25</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-GlaHovSte25</guid>
</item>

		
<item>
	<title>Research paper: Kemeleon encodings</title>
	<dc:creator>Felix Günther, Douglas Stebila, Shannon Veitch</dc:creator>
	<description>Abstract: This document specifies Kemeleon encoding algorithms for encoding ML-KEM public keys and ciphertexts as random bytestrings. Kemeleon encodings provide obfuscation of public keys and ciphertexts, relying on module LWE assumptions. This document specifies a number of variants of these encodings, with differing failure rates, output sizes, and performance profiles.</description>
	<pubDate>Fri, 16 Jan 2026 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/draft-irtf-cfrg-kemeleon</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/draft-irtf-cfrg-kemeleon</guid>
</item>

		
<item>
	<title>Photo gallery: Japan • 2023</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Japan • 2023</description>
	<pubDate>Mon, 10 Apr 2023 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2023-japan</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2023-japan</guid>
</item>


		
<item>
	<title>Research paper: TurboTLS: TLS connection establishment with 1 less round trip</title>
	<dc:creator>Carlos Aguilar-Melchor, Thomas Bailleux, Jason Goertzen, Adrien Guinet, David Joseph, Douglas Stebila</dc:creator>
	<description>Abstract: We show how to establish TLS connections using one less round trip.  In our approach, which we call TurboTLS, the initial client-to-server and server-to-client flows of the TLS handshake are sent over UDP rather than TCP.  At the same time, in the same flights, the three-way TCP handshake is carried out.  Once the TCP connection is established, the client and server can complete the final flight of the TLS handshake over the TCP connection and continue using it for application data.  No changes are made to the contents of the TLS handshake protocol, only its delivery mechanism.  We avoid problems with UDP fragmentation by using &lt;i&gt;request-based fragmentation&lt;/i&gt;, in which the client sends in advance enough UDP requests to provide sufficient room for the server to fit its response with one response packet per request packet.  Clients can detect which servers support this without an additional round trip, if the server advertises its support in a DNS HTTPS resource record.  Experiments using our software implementation show substantial latency improvements.  On reliable connections, we effectively eliminate a round trip without any noticeable cost.  To ensure adequate performance on unreliable connections, we use lightweight packet ordering and buffering; we can have a client wait a very small time to receive a potentially lost packet (e.g.,  a fraction of the RTT observed for the first fragment) before falling back to TCP without any further delay, since the TCP connection was already in the process of being established.  This approach offers substantial performance improvements with low complexity, even in heterogeneous network environments with poorly configured middleboxes.</description>
	<pubDate>Mon, 16 Sep 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/ESORICS-ABGGJS24</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/ESORICS-ABGGJS24</guid>
</item>

		
		
<item>
	<title>Presentation: A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat, presented at Workshop on Attacks in Cryptography 7 (WAC7)</description>
	<pubDate>Sun, 18 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20240818-WAC-Encrochat.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20240818-WAC-Encrochat.pdf</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part X</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part10</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part10</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part IX</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part9</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part9</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part VIII</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part8</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part8</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part VII</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part7</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part7</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part VI</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part6</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part6</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part V</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part5</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part5</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part IV</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part4</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part4</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part III</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part3</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part3</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part II</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part2</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part2</guid>
</item>

		
<item>
	<title>Research paper: Advances in Cryptology – CRYPTO 2024, Part I</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Crypto2024Part1</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Crypto2024Part1</guid>
</item>

		
<item>
	<title>Photo gallery: Taiwan • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Taiwan • 2024</description>
	<pubDate>Mon, 20 May 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-taiwan</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-taiwan</guid>
</item>


		
<item>
	<title>Photo gallery: Norway • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Norway • 2024</description>
	<pubDate>Mon, 29 Jul 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-norway</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-norway</guid>
</item>


		
<item>
	<title>Photo gallery: Copenhagen • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Copenhagen • 2024</description>
	<pubDate>Thu, 08 Aug 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-copenhagen</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-copenhagen</guid>
</item>


		
<item>
	<title>Research paper: Falsifiability, composability, and comparability of game-based security models for key exchange protocols</title>
	<dc:creator>Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, Bogdan Warinschi</dc:creator>
	<description>Abstract: &lt;p&gt;A security proof for a key exchange protocol requires writing down a security definition. Authors typically have a clear idea of the level of security they aim to achieve. Defining the model formally additionally requires making choices on games vs. simulation-based models, partnering, on having one or more Test queries and on adopting a style of avoiding trivial attacks: exclusion, penalizing or filtering. We elucidate the consequences, advantages and disadvantages of the different possible model choices.&lt;/p&gt; &lt;p&gt;Concretely, we show that a model with multiple Test queries composes tightly with symmetric-key protocols while models with a single Test query require a hybrid argument that loses a factor in the number of sessions. To illustrate the usefulness of models with multiple Test queries, we prove the Naxos protocol security in said model and obtain a tighter bound than adding a hybrid argument on top of a proof in a single Test query model.&lt;/p&gt; &lt;p&gt;Our composition &lt;i&gt;model&lt;/i&gt; exposes partnering information to the adversary, circumventing a previous result by Brzuska, Fischlin, Warinschi, and Williams (CCS 2011) showing that the &lt;i&gt;protocol&lt;/i&gt; needs to provide public partnering. Moreover, our baseline theorem of key exchange partnering shows that partnering by &lt;i&gt;key equality&lt;/i&gt; provides a joint baseline for most known partnering mechanisms, countering previous criticism by Li and Schäge (CCS 2017) that security in models with existential quantification over session identifiers is non-falsifiable.&lt;/p&gt;</description>
	<pubDate>Mon, 17 Mar 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-BCJSW24</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-BCJSW24</guid>
</item>

		
		
<item>
	<title>Photo gallery: Switzerland • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Switzerland • 2024</description>
	<pubDate>Sat, 15 Jun 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-switzerland</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-switzerland</guid>
</item>


		
<item>
	<title>Photo gallery: Italy • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Italy • 2024</description>
	<pubDate>Mon, 10 Jun 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-italy</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-italy</guid>
</item>


		
<item>
	<title>Research paper: Quantum-safe account recovery for WebAuthn</title>
	<dc:creator>Douglas Stebila, Spencer Wilson</dc:creator>
	<description>Abstract: &lt;p&gt;WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity by signing a challenge with a private key, which is stored on a device such as a cell phone or a USB security token. This approach avoids many of the common security problems with password-based authentication.&lt;/p&gt;
&lt;p&gt;WebAuthn&apos;s reliance on proof-of-possession leads to a usability issue, however: a user who loses access to their authenticator device either loses access to their accounts or is required to fall back on a weaker authentication mechanism. To solve this problem, Yubico has proposed a protocol which allows a user to link two tokens in such a way that one (the primary authenticator) can generate public keys on behalf of the other (the backup authenticator). With this solution, users authenticate with a single token, only relying on their backup token if necessary for account recovery. However, Yubico&apos;s protocol relies on the hardness of the discrete logarithm problem for its security and hence is vulnerable to an attacker with a powerful enough quantum computer.&lt;/p&gt;
&lt;p&gt;We present a WebAuthn recovery protocol which can be instantiated with quantum-safe primitives. We also critique the security model used in previous analysis of Yubico&apos;s protocol and propose a new framework which we use to evaluate the security of both the group-based and the quantum-safe protocol. This leads us to uncover a weakness in Yubico&apos;s proposal which escaped detection in prior work but was revealed by our model. In our security analysis, we require the cryptographic primitives underlying the protocols to satisfy a number of novel security properties such as KEM unlinkability, which we formalize. We prove that well-known quantum-safe algorithms, including CRYSTALS-Kyber, satisfy the properties required for analysis of our quantum-safe protocol.&lt;/p&gt;</description>
	<pubDate>Mon, 01 Jul 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/ASIACCS-SteWil24</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/ASIACCS-SteWil24</guid>
</item>

		
<item>
	<title>Photo gallery: Barcelona • 2024</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Barcelona • 2024</description>
	<pubDate>Sun, 12 May 2024 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2024-barcelona</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2024-barcelona</guid>
</item>


		
<item>
	<title>Blog post: Security analysis of Apple&apos;s iMessage PQ3 protocol</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Today Apple announced its new iMessage PQ3 protocol, which is an update to the cryptographic protocol used in iMessage that adds post-quantum cryptography.  I worked with Apple over the past few months to analyze the protocol and show that it meets the security goals, and have written a paper describing my findings.  I’m glad to see the adoption of post-quantum cryptography protocols continuing.
</description>
	<pubDate>Wed, 21 Feb 2024 09:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/blog/archives/2024/02/21/imessage-pq3/</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/blog/archives/2024/02/21/imessage-pq3/</guid>
</item>

		
<item>
	<title>Research paper: Security analysis of the iMessage PQ3 protocol</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Abstract: The iMessage PQ3 protocol is an end-to-end encrypted messaging protocol designed for exchanging data in long-lived sessions between two devices. It aims to provide classical and post-quantum confidentiality for forward secrecy and post-compromise secrecy, as well as classical authentication. Its initial authenticated key exchange is constructed from digital signatures plus elliptic curve Diffie–Hellman and post-quantum key exchanges; to derive per-message keys on an ongoing basis, it employs an adaptation of the Signal double ratchet that includes a post-quantum key encapsulation mechanism. This paper presents the cryptographic details of the PQ3 protocol and gives a reductionist security analysis by adapting the multi-stage key exchange security analysis of Signal by Cohn-Gordon et al. (J. Cryptology, 2020). The analysis shows that PQ3 provides confidentiality with forward secrecy and post-compromise security against both classical and quantum adversaries, in both the initial key exchange as well as the continuous rekeying phase of the protocol.</description>
	<pubDate>Wed, 21 Feb 2024 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/Apple-Stebila24</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/Apple-Stebila24</guid>
</item>

		
<item>
	<title>Blog post: Launch of the Linux Foundation&apos;s Post-Quantum Cryptography Alliance</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Today is the launch of the Post-Quantum Cryptography Alliance, a new open-source software foundation within the Linux Foundation, which will be the new home of the Open Quantum Safe project.</description>
	<pubDate>Tue, 06 Feb 2024 09:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/blog/archives/2024/02/06/pqca/</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/blog/archives/2024/02/06/pqca/</guid>
</item>

		
		
<item>
	<title>Research paper: Making an asymmetric PAKE quantum-annoying by hiding group elements</title>
	<dc:creator>Marcel Tiepelt, Edward Eaton, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;The KHAPE-HMQV protocol is a state-of-the-art highly efficient asymmetric password-authenticated key exchange protocol that provides several desirable security properties, but has the drawback of being vulnerable to quantum adversaries due to its reliance on discrete logarithm-based building blocks: solving a single discrete logarithm allows the attacker to perform an offline dictionary attack and recover the password. We show how to modify KHAPE-HMQV to make the protocol quantum-annoying: a classical adversary who has the additional ability to solve discrete logarithms can only break the protocol by solving a discrete logarithm for each guess of the password.&lt;/p&gt; &lt;p&gt;While not fully resistant to attacks by quantum computers, a quantum-annoying protocol could offer some resistance to quantum adversaries for whom discrete logarithms are relatively expensive. Our modification to the protocol is small: encryption (using an ideal cipher) is added to one message. Our analysis uses the same ideal cipher model assumption as the original analysis of KHAPE, and quantum annoyingness is modelled using an extension of the generic group model which gives a classical adversary a discrete logarithm oracle.&lt;/p&gt;</description>
	<pubDate>Mon, 25 Sep 2023 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/ESORICS-TieEatSte23</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/ESORICS-TieEatSte23</guid>
</item>

		
<item>
	<title>Blog post: New York Times article on post-quantum cryptography</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>The New York Times has an article today about the need to transition to post-quantum cryptography, and the governemnt and academic efforts over the past few years.</description>
	<pubDate>Sun, 22 Oct 2023 11:15:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/blog/archives/2023/10/22/nytimes-post-quantum/</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/blog/archives/2023/10/22/nytimes-post-quantum/</guid>
</item>

		
<item>
	<title>Presentation: New Initiatives in Open-Source Post-Quantum Software</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>New Initiatives in Open-Source Post-Quantum Software, presented at International Cryptographic Module Conference 2023</description>
	<pubDate>Thu, 21 Sep 2023 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20230921-ICMC.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20230921-ICMC.pdf</guid>
</item>

		
<item>
	<title>Photo gallery: Colorado • 2022</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Colorado • 2022</description>
	<pubDate>Tue, 20 Sep 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2022-colorado</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2022-colorado</guid>
</item>


		
<item>
	<title>Research paper: X25519Kyber768Draft00 hybrid post-quantum key agreement</title>
	<dc:creator>Bas Westerbaan, Douglas Stebila</dc:creator>
	<description>Abstract: This memo defines X25519Kyber768Draft00, a hybrid post-quantum key exchange for TLS 1.3.</description>
	<pubDate>Fri, 31 Mar 2023 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/draft-tls-westerbaan-xyber768d00</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/draft-tls-westerbaan-xyber768d00</guid>
</item>

		
<item>
	<title>Presentation: Standardizing post-quantum cryptography at the IETF</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Standardizing post-quantum cryptography at the IETF, presented at Real World PQC</description>
	<pubDate>Sun, 26 Mar 2023 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20230326-RWPQC.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20230326-RWPQC.pdf</guid>
</item>

		
<item>
	<title>Research paper: A formal treatment of distributed key generation, and new constructions</title>
	<dc:creator>Chelsea Komlo, Ian Goldberg, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;In this work, we present a novel generic construction for a Distributed Key Generation (DKG) scheme. Our generic construction relies on three modular cryptographic building blocks. The first is an aggregatable Verifiable Secret Sharing (AgVSS) scheme, the second is a Non-Interactive Key Exchange (NIKE) scheme, and the third is a secure hash function. We give formal definitions for the AgVSS and NIKE schemes, as well as concrete constructions. The utility of this generic construction is flexibility; i.e., any aggregatable VSS and NIKE scheme can be employed, and the construction will remain secure.&lt;/p&gt;
&lt;p&gt;To prove the security of our generic construction, we introduce formalized game based notions of security for DKGs, building upon existing notions in the literature. However, these prior security notions either were presented informally, omitted important requirements, or assumed certain algebraic structure of the underlying scheme. Our security notions make no such assumption of underlying algebraic structure, and explicitly consider details such as participant consistency, communication patterns, and key validity. Further, our security notions imply simulatability with respect to a target key generation scheme without rewinding. Hence, any construction that is proven secure using our security notions additionally imply UC security.&lt;/p&gt;
&lt;p&gt;We then present STORM, a concrete instantiation of our generic construction that is secure in the discrete logarithm setting in the random oracle model. STORM is more efficient than related DKG schemes in the literature. Because of its simple design and composability, it is a practical choice for real world settings and standardization efforts.&lt;/p&gt;</description>
	<pubDate>Mon, 27 Feb 2023 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/EPRINT-KomGolSte23</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/EPRINT-KomGolSte23</guid>
</item>

		
<item>
	<title>Presentation: Rethinking Internet protocols for post-quantum cryptography</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Rethinking Internet protocols for post-quantum cryptography, presented at Virginia Tech</description>
	<pubDate>Tue, 21 Feb 2023 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20230221-VirginiaTech.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20230221-VirginiaTech.pdf</guid>
</item>

		
		
<item>
	<title>Photo gallery: Switzerland • 2022</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Switzerland • 2022</description>
	<pubDate>Mon, 18 Apr 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2022-switzerland</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2022-switzerland</guid>
</item>


		
<item>
	<title>Photo gallery: Paris, France • 2022</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Paris, France • 2022</description>
	<pubDate>Sat, 16 Apr 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2022-paris</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2022-paris</guid>
</item>


		
<item>
	<title>Photo gallery: Amsterdam, Netherlands • 2022</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Amsterdam, Netherlands • 2022</description>
	<pubDate>Sun, 10 Apr 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2022-amsterdam</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2022-amsterdam</guid>
</item>


		
<item>
	<title>Photo gallery: Italy and San Marino • 2022</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Italy and San Marino • 2022</description>
	<pubDate>Thu, 14 Jul 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2022-italy-san-marino</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2022-italy-san-marino</guid>
</item>


		
<item>
	<title>Research paper: Proof-of-possession for KEM certificates using verifiable generation</title>
	<dc:creator>Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha</dc:creator>
	<description>Abstract: Certificate authorities in public key infrastructures typically require entities to prove possession of the secret key corresponding to the public key they want certified. While this is straightforward for digital signature schemes, the most efficient solution for public key encryption and key encapsulation mechanisms (KEMs) requires an interactive challenge-response protocol, requiring a departure from current issuance processes. In this work we investigate how to non-interactively prove possession of a KEM secret key, specifically for lattice-based KEMs, motivated by the recently proposed KEMTLS protocol which replaces signature-based authentication in TLS 1.3 with KEM-based authentication. Although there are various zero-knowledge (ZK) techniques that can be used to prove possession of a lattice key, they yield large proofs or are inefficient to generate. We propose a technique called verifiable generation, in which a proof of possession is generated at the same time as the key itself is generated. Our technique is inspired by the Picnic signature scheme and uses the multi-party-computation-in-the-head (MPCitH) paradigm; this similarity to a signature scheme allows us to bind attribute data to the proof of possession, as required by certificate issuance protocols. We show how to instantiate this approach for two lattice-based KEMs in Round 3 of the NIST post-quantum cryptography standardization project, Kyber and FrodoKEM, and achieve reasonable proof sizes and performance. Our proofs of possession are faster and an order of magnitude smaller than the previous best MPCitH technique for knowledge of a lattice key, and in size-optimized cases can be comparable to even state-of-the-art direct lattice-based ZK proofs for Kyber. Our approach relies on a new result showing the uniqueness of Kyber and FrodoKEM secret keys, even if the requirement that all secret key components are small is partially relaxed, which may be of independent interest for improving efficiency of zero-knowledge proofs for other lattice-based statements.</description>
	<pubDate>Mon, 07 Nov 2022 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/CCS-GHLOSZ22</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/CCS-GHLOSZ22</guid>
</item>

		
<item>
	<title>Research paper: A tale of two models: formal verification of KEMTLS via Tamarin</title>
	<dc:creator>Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers</dc:creator>
	<description>Abstract: &lt;p&gt;KEMTLS is a proposal for changing the TLS handshake to authenticate the handshake using long-term key encapsulation mechanism keys instead of signatures, motivated by trade-offs in the characteristics of post-quantum algorithms. Prior proofs of security of KEMTLS and its variant KEMTLS-PDK have been hand-written proofs  in the reductionist model under computational assumptions. In this paper, we present computer-verified symbolic analyses of KEMTLS and KEMTLS-PDK using two distinct Tamarin models. In the first analysis, we adapt the detailed Tamarin model of TLS 1.3 by Cremers et al. (ACM CCS 2017), which closely follows the wire-format of the protocol specification, to KEMTLS(-PDK). We show that KEMTLS(-PDK) has equivalent security properties to the main handshake of TLS 1.3 proven in this model.  We were able to fully automate this Tamarin proof, compared with the previous TLS 1.3 Tamarin model, which required a big manual proving effort; we also uncovered some inconsistencies in the previous model. In the second analysis, we present a novel Tamarin model of KEMTLS(-PDK), which closely follows the multi-stage key exchange security model from prior pen-and-paper proofs of KEMTLS(-PDK). The second approach is further away from the wire-format of the protocol specification but captures more subtleties in security definitions, like deniability and different levels of forward secrecy; it also identifies some flaws in the security claims from the pen-and-paper proofs. Our positive security results increase the confidence in the design of KEMTLS(-PDK). Moreover, viewing these models side-by-side allows us to comment on the trade-off in symbolic analysis between detail in protocol specification and granularity of security properties.&lt;/p&gt;</description>
	<pubDate>Mon, 26 Sep 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/ESORICS-CHST22</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/ESORICS-CHST22</guid>
</item>

		
<item>
	<title>Presentation: Integrating post-quantum cryptography into real-world protocols part 2</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Integrating post-quantum cryptography into real-world protocols part 2, presented at SAC Summer School 2022</description>
	<pubDate>Mon, 22 Aug 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20220822-SAC-part2.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20220822-SAC-part2.pdf</guid>
</item>

		
<item>
	<title>Presentation: Integrating post-quantum cryptography into real-world protocols part 1</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Integrating post-quantum cryptography into real-world protocols part 1, presented at SAC Summer School 2022</description>
	<pubDate>Mon, 22 Aug 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20220822-SAC-part1.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20220822-SAC-part1.pdf</guid>
</item>

		
<item>
	<title>Presentation: Proving KEMTLS in Tamarin</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Proving KEMTLS in Tamarin, presented at Secure Key Exchange and Channels workshop (SKECH)</description>
	<pubDate>Tue, 12 Jul 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20220712-SKECH-Tamarin.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20220712-SKECH-Tamarin.pdf</guid>
</item>

		
<item>
	<title>Presentation: Preparing for post-quantum TLS</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Preparing for post-quantum TLS, presented at European Space Agency workshop on Secure Communications for Space Missions in the Post-Quantum Era</description>
	<pubDate>Mon, 27 Jun 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20220627-ESA.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20220627-ESA.pdf</guid>
</item>

		
<item>
	<title>Presentation: Recent results for KEMTLS</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Recent results for KEMTLS, presented at Technology Innovation Institute</description>
	<pubDate>Thu, 12 May 2022 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20220512-TII.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20220512-TII.pdf</guid>
</item>

		
		
<item>
	<title>Research paper: Post-quantum asynchronous deniable key exchange and the Signal handshake</title>
	<dc:creator>Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;The key exchange protocol that establishes initial shared secrets in the handshake of the Signal end-to-end encrypted messaging protocol has several important characteristics: (1) it runs asynchronously (without both parties needing to be simultaneously online), (2) it provides implicit mutual authentication while retaining deniability (transcripts cannot be used to prove either party participated in the protocol), and (3) it retains security even if some keys are compromised (forward secrecy and beyond). All of these properties emerge from clever use of the highly flexible Diffie–Hellman protocol.&lt;/p&gt;
&lt;p&gt;While quantum-resistant key encapsulation mechanisms (KEMs) can replace Diffie–Hellman key exchange in some settings, there is no replacement for the Signal handshake solely from KEMs that achieves all three aforementioned properties, in part due to the inherent asymmetry of KEM operations. In this paper, we show how to construct asynchronous deniable key exchange by combining KEMs and designated verifier signature (DVS) schemes, matching the characteristics of Signal. There are several candidates for post-quantum DVS schemes, either direct constructions or via ring signatures. This yields a template for an efficient post-quantum realization of the Signal handshake with the same asynchronicity and security properties as the original Signal protocol.&lt;/p&gt;</description>
	<pubDate>Fri, 11 Mar 2022 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/PKC-BFGJS22</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/PKC-BFGJS22</guid>
</item>

		
<item>
	<title>Presentation: Transitioning the TLS protocol to post-quantum cryptography</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Transitioning the TLS protocol to post-quantum cryptography, presented at Cryptology and Network Security (CANS) 2021</description>
	<pubDate>Tue, 14 Dec 2021 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20211214-CANS.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20211214-CANS.pdf</guid>
</item>

		
<item>
	<title>Research paper: The Advanced Encryption Standard: 20 years later</title>
	<dc:creator>Alfred Menezes, Douglas Stebila</dc:creator>
	<description>Abstract: The 20th anniversary of the standardization of the Advanced Encryption Standard (AES), the workhorse of cryptographic algorithms, takes place on 26 November 2021. In this column, we recount the history of the AES and its predecessor, the Data Encryption Standard.</description>
	<pubDate>Mon, 01 Nov 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/SPMAG-MenSte21c</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/SPMAG-MenSte21c</guid>
</item>

		
<item>
	<title>Research paper: CHES 2021 artifact review</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Abstract: This short preface provides an overview of the artifact review process for CHES 2021.</description>
	<pubDate>Wed, 15 Sep 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/TCHES-Ste21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/TCHES-Ste21</guid>
</item>

		
<item>
	<title>Research paper: Algorithm substitution attacks: state reset detection and asymmetric modifications</title>
	<dc:creator>Philip Hodges, Douglas Stebila</dc:creator>
	<description>Abstract: In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize this result, allowing for any symmetric ASA (on any cryptographic scheme) satisfying certain properties to be transformed into an asymmetric ASA. Our work demonstrates the broad application of the techniques first introduced by Bellare, Paterson, and Rogaway (Crypto 2014) and Bellare, Jaeger, and Kane (CCS 2015) and reinforces the need for precise definitions surrounding detectability of stateful ASAs.</description>
	<pubDate>Fri, 11 Jun 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/TOSC-HodSte21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/TOSC-HodSte21</guid>
</item>

		
<item>
	<title>Presentation: Hybrid key exchange in TLS 1.3</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Hybrid key exchange in TLS 1.3, presented at IETF 111</description>
	<pubDate>Wed, 28 Jul 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20210728-IETF.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20210728-IETF.pdf</guid>
</item>

		
<item>
	<title>Research paper: Post-quantum key-blinding for authentication in anonymity networks</title>
	<dc:creator>Edward Eaton, Douglas Stebila, Roy Stracovsky</dc:creator>
	<description>Abstract: &lt;p&gt;Anonymity networks, such as the Tor network, are highly decentralized and make heavy use of ephemeral identities. Both of these characteristics run in direct opposition to a traditional public key infrastructure, so entity authentication in an anonymity network can be a challenge. One system that Tor relies on is key-blinded signatures, which allow public keys to be transformed so that authentication is still possible, but the identity public key is masked. This is used in Tor during onion service descriptor lookup, in which a .onion address is resolved to a rendezvous point through which a client and an onion service can communicate. The mechanism currently used is based on elliptic curve signatures, so a post-quantum replacement will be needed.&lt;/p&gt;
&lt;p&gt;We consider four fully post-quantum key-blinding schemes, and prove the unlinkability and unforgeability of all schemes in the random-oracle model. We provide a generic framework for proving unlinkability of key-blinded schemes by reducing to two properties, signing with oracle reprogramming and independent blinding. Of the four schemes, two are based on Round 3 candidates in NIST&apos;s post-quantum signature standardization process, Dilithium and Picnic. The other two are based on much newer schemes, CSI-FiSh and LegRoast, which have more favourable characteristics for blinding. CSI-FiSh is based on isogenies and boasts a very small public key plus signature sizes, and its group action structure allows for key-blinding in a straightforward way. LegRoast uses the Picnic framework, but with the Legendre symbol PRF as a symmetric primitive, the homomorphic properties of which can be exploited to blind public keys in a novel way. Our schemes require at most small changes to parameters, and are generally almost as fast as their unblinded counterparts, except for blinded Picnic, for which signing and verifying is roughly half as fast.&lt;/p&gt;</description>
	<pubDate>Wed, 06 Oct 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/LATINCRYPT-EatSteStr21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/LATINCRYPT-EatSteStr21</guid>
</item>

		
<item>
	<title>Photo gallery: Israel • 2018</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Israel • 2018</description>
	<pubDate>Fri, 27 Apr 2018 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2018-israel</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2018-israel</guid>
</item>


		
<item>
	<title>Photo gallery: Petra, Jordan • 2018</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Petra, Jordan • 2018</description>
	<pubDate>Fri, 04 May 2018 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2018-petra</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2018-petra</guid>
</item>


		
<item>
	<title>Photo gallery: Wadi Rum, Jordan • 2018</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Wadi Rum, Jordan • 2018</description>
	<pubDate>Sun, 06 May 2018 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2018-wadi-rum</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2018-wadi-rum</guid>
</item>


		
<item>
	<title>Photo gallery: December in the Alps • 2019</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: December in the Alps • 2019</description>
	<pubDate>Fri, 13 Dec 2019 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2019-alps</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2019-alps</guid>
</item>


		
<item>
	<title>Research paper: End-to-end security: when do we have it?</title>
	<dc:creator>Alfred Menezes, Douglas Stebila</dc:creator>
	<description>Abstract: When two parties, Alice and Bob, engage in a communication that is intended to be private, whether it be a face-to-face conversation, a phone conversation, a chat using a messaging app, or an exchange of emails, they would like the assurance that their communication remains confidential. Thus, no party, other than Alice and Bob, should be able to learn the contents of their communications—not even the messaging service provider. This desirable security property is called end-to-end security, and it can be provided by using end-to-end encryption, i.e., by using an encryption scheme in such a way that only Alice and Bob can decrypt the messages that the other party has sent.</description>
	<pubDate>Thu, 01 Jul 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/SPMAG-MenSte21b</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/SPMAG-MenSte21b</guid>
</item>

		
<item>
	<title>Research paper: KEM-based authentication for TLS 1.3</title>
	<dc:creator>Thom Wiggers, Sofía Celi, Peter Schwabe, Douglas Stebila, Nick Sullivan</dc:creator>
	<description>Abstract: This document gives a construction for a Key Encapsulation Mechanism (KEM)-based authentication mechanism in TLS 1.3.  This proposal authenticates peers via a key exchange protocol, using their long-term (KEM) public keys.</description>
	<pubDate>Tue, 04 Nov 2025 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/draft-celi-wiggers-tls-authkem</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/draft-celi-wiggers-tls-authkem</guid>
</item>

		
<item>
	<title>Photo gallery: Life in Ontario • 2020</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Life in Ontario • 2020</description>
	<pubDate>Thu, 31 Dec 2020 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2020-ontario</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2020-ontario</guid>
</item>


		
<item>
	<title>Photo gallery: Bruce Peninsula • 2020</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Bruce Peninsula • 2020</description>
	<pubDate>Sat, 17 Oct 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2020-bruce-peninsula</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2020-bruce-peninsula</guid>
</item>


		
<item>
	<title>Photo gallery: New York • 2020</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: New York • 2020</description>
	<pubDate>Sat, 11 Jan 2020 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2020-new-york</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2020-new-york</guid>
</item>


		
<item>
	<title>Research paper: More efficient post-quantum KEMTLS with pre-distributed public keys</title>
	<dc:creator>Peter Schwabe, Douglas Stebila, Thom Wiggers</dc:creator>
	<description>Abstract: &lt;p&gt;While server-only authentication with certificates is the most widely used mode of operation for the Transport Layer Security (TLS) protocol on the world wide web, there are many applications where TLS is used in a different way or with different constraints. For example, embedded Internet-of-Things clients may have a server certificate pre-programmed and be highly constrained in terms of communication bandwidth or computation power. As post-quantum algorithms have a wider range of performance trade-offs, designs other than traditional “signed-key-exchange” may be worthwhile. The KEMTLS protocol, presented at ACM CCS 2020, uses key encapsulation mechanisms (KEMs) rather than signatures for authentication in the TLS 1.3 handshake, a benefit since most post-quantum KEMs are more efficient than PQ signatures. However, KEMTLS has some drawbacks, especially in the client authentication scenario which requires a full additional roundtrip.&lt;/p&gt;
&lt;p&gt;We explore how the situation changes with pre-distributed public keys, which may be viable in many scenarios, for example pre-installed public keys in apps, on embedded devices, cached public keys, or keys distributed out of band. Our variant of KEMTLS with pre-distributed keys, called KEMTLS-PDK, is more efficient in terms of both bandwidth and computation compared to post-quantum signed-KEM TLS (even cached public keys), and has a smaller trusted code base. When client authentication is used, KEMTLS-PDK is more bandwidth efficient than KEMTLS yet can complete client authentication in one fewer round trips, and has stronger authentication properties. Interestingly, using pre-distributed keys in KEMTLS-PDK changes the landscape on suitability of PQ algorithms: schemes where public keys are larger than ciphertexts/signatures (such as Classic McEliece and Rainbow) can be viable, and the differences between some lattice-based schemes is reduced. We also discuss how using pre-distributed public keys provides privacy benefits compared to pre-shared symmetric keys in TLS.&lt;/p&gt;</description>
	<pubDate>Mon, 04 Oct 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/ESORICS-SchSteWig21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/ESORICS-SchSteWig21</guid>
</item>

		
<item>
	<title>Research paper: The “quantum annoying” property of password-authenticated key exchange protocols</title>
	<dc:creator>Edward Eaton, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;During the Crypto Forum Research Group (CFRG)&apos;s standardization of password-authenticated key exchange (PAKE) protocols, a novel property emerged: a PAKE scheme is said to be “quantum annoying” if a quantum computer can compromise the security of the scheme, but only by solving one discrete logarithm for each guess of a password. Considering that early quantum computers will likely take quite long to solve even a single discrete logarithm, a quantum-annoying PAKE, combined with a large password space, could delay the need for a post-quantum replacement by years, or even decades.&lt;/p&gt;
&lt;p&gt;In this paper, we make the first steps towards formalizing the quantum-annoying property. We consider a classical adversary in an extension of the generic group model in which the adversary has access to an oracle that solves discrete logarithms. While this idealized model does not fully capture the range of operations available to an adversary with a general-purpose quantum computer, this model does allow us to quantify security in terms of the number of discrete logarithms solved. We apply this approach to the CPace protocol, a balanced PAKE advancing through the CFRG standardization process, and show that the CPaceBase variant is secure in the generic group model with a discrete logarithm oracle.&lt;/p&gt;</description>
	<pubDate>Tue, 20 Jul 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/PQCrypto-EatSte21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/PQCrypto-EatSte21</guid>
</item>

		
<item>
	<title>Presentation: Post-quantum TLS without handshake signatures</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Post-quantum TLS without handshake signatures, presented at Alphabet</description>
	<pubDate>Thu, 13 May 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20210513-Alphabet.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20210513-Alphabet.pdf</guid>
</item>

		
<item>
	<title>Presentation: Open Quantum Safe update and Post-quantum TLS without handshake signatures</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Open Quantum Safe update and Post-quantum TLS without handshake signatures, presented at VMware PQC Forum</description>
	<pubDate>Thu, 18 Mar 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20210318-VMware.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20210318-VMware.pdf</guid>
</item>

		
<item>
	<title>Presentation: Making and breaking implicitly authenticated post-quantum key exchange</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Making and breaking implicitly authenticated post-quantum key exchange, presented at CISPA Helmholtz Center for Information Security</description>
	<pubDate>Fri, 05 Feb 2021 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20210205-CISPA.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20210205-CISPA.pdf</guid>
</item>

		
<item>
	<title>Research paper: SoK: Game-based security models for group key exchange</title>
	<dc:creator>Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure key material. Many flavors of GKE have been proposed, differentiated by, among others, whether group membership is static or dynamic, whether a single key or a continuous stream of keys is established, and whether security is provided in the presence of state corruptions (post-compromise security). In all cases, an indispensable ingredient to the rigorous analysis of a candidate solution is a corresponding formal security model. We observe, however, that most GKE-related publications are more focused on building new constructions that have more functionality or are more efficient than prior proposals, while leaving the job of identifying and working out the details of adequate security models a subordinate task.&lt;/p&gt;
&lt;p&gt;In this systematization of knowledge we bring the formal modeling of GKE security to the fore by revisiting the intuitive goals of GKE, critically evaluating how these goals are reflected (or not) in the established models, and how they would be best considered in new models. We classify and compare characteristics of a large selection of game-based GKE models that appear in the academic literature, including those proposed for GKE with post-compromise security. We observe a range of shortcomings in some of the studied models, such as dependencies on overly restrictive syntactical constrains, unrealistic adversarial capabilities, or simply incomplete definitions. Our systematization enables us to identify a coherent suite of desirable characteristics that we believe should be represented in all general purpose GKE models. To demonstrate the feasibility of covering all these desirable characteristics simultaneously in one concise definition, we conclude with proposing a new generic reference model for GKE.&lt;/p&gt;</description>
	<pubDate>Mon, 17 May 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/CTRSA-PRSS21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/CTRSA-PRSS21</guid>
</item>

		
<item>
	<title>Presentation: Post-quantum TLS</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Post-quantum TLS, presented at Indian Workshop on Post-Quantum Cryptography</description>
	<pubDate>Tue, 17 Nov 2020 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20201117-Indian-PQC.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20201117-Indian-PQC.pdf</guid>
</item>

		
<item>
	<title>Research paper: FrodoKEM: Learning with errors key encapsulation</title>
	<dc:creator>Erdem Alkim, Joppe W. Bos, Léo Ducas, Karen Easterbrook, Brian LaMacchia, Patrick Longa, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Chris Peikert, Ananth Raghunathan, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;This submission defines a family of key-encapsulation mechanisms (KEMs), collectively called FrodoKEM. The FrodoKEM schemes are designed to be &lt;i&gt;conservative&lt;/i&gt; yet &lt;i&gt;practical&lt;/i&gt; post-quantum constructions whose security derives from cautious parameterizations of the well-studied &lt;i&gt;learning with errors&lt;/i&gt; problem, which in turn has close connections to conjectured-hard problems on &lt;i&gt;generic&lt;/i&gt;, “algebraically unstructured” lattices.&lt;/p&gt; &lt;p&gt;Concretely, FrodoKEM is designed for IND-CCA security at three levels:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;FrodoKEM-640, which targets Level 1 in the NIST call for proposals (matching or exceeding the brute-force security of AES-128),&lt;/li&gt; &lt;li&gt;FrodoKEM-976, which targets Level 3 in the NIST call for proposals (matching or exceeding the brute-force security of AES-192), and&lt;/li&gt; &lt;li&gt;FrodoKEM-1344, which targets Level 5 in the NIST call for proposals (matching or exceeding the brute-force security of AES-256).&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Two variants of each of the above schemes are provided:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;FrodoKEM-640-AES, FrodoKEM-976-AES, and FrodoKEM-1344-AES, which use AES128 to pseudorandomly generate a large public matrix (called A).&lt;/li&gt; &lt;li&gt;FrodoKEM-640-SHAKE, FrodoKEM-976-SHAKE, and FrodoKEM-1344-SHAKE, which use SHAKE128 to pseudorandomly generate the matrix.&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;The AES variants are particularly suitable for devices having AES hardware acceleration (such as AES-NI on Intel platforms), while the SHAKE variants generally provide competitive or better performance in comparison with the AES variants in the absence of hardware acceleration.</description>
	<pubDate>Wed, 30 Sep 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/NIST-FrodoKEM-20200930</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/NIST-FrodoKEM-20200930</guid>
</item>

		
<item>
	<title>Research paper: ArchiveSafe: mass-leakage-resistant storage from proof-of-work</title>
	<dc:creator>Moe Sabry, Reza Samavi, Douglas Stebila</dc:creator>
	<description>Abstract: Data breaches-mass leakage of stored information-are a major security concern. Encryption can provide confidentiality, but encryption depends on a key which, if compromised, allows the attacker to decrypt everything, effectively instantly. Security of encrypted data thus becomes a question of protecting the encryption keys. In this paper, we propose using keyless encryption to construct a mass leakage resistant archiving system, where decryption of a file is only possible after the requester, whether an authorized user or an adversary, completes a proof of work in the form of solving a cryptographic puzzle. This proposal is geared towards protection of infrequently-accessed archival data, where any one file may not require too much work to decrypt, decryption of a large number of files-mass leakage-becomes increasingly expensive for an attacker. We present a prototype implementation realized as a user-space file system driver for Linux. We report experimental results of system behaviour under different file sizes and puzzle difficulty levels. Our keyless encryption technique can be added as a layer on top of traditional encryption: together they provide strong security against adversaries without the key and resistance against mass decryption by an attacker.</description>
	<pubDate>Thu, 17 Sep 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/DPM-SabSamSte20</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/DPM-SabSamSte20</guid>
</item>

		
<item>
	<title>Presentation: The current status of post-quantum cryptography</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>The current status of post-quantum cryptography, presented at SERENE-RISC 2020 Workshop</description>
	<pubDate>Wed, 21 Oct 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20201021-SERENE-RISC.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20201021-SERENE-RISC.pdf</guid>
</item>

		
		
<item>
	<title>Research paper: A formal security analysis of the Signal messaging protocol</title>
	<dc:creator>Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila</dc:creator>
	<description>Abstract: The Signal protocol is a cryptographic messaging protocol that provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among many others, serving well over 1 billion active users. Signal includes several uncommon security properties (such as “future secrecy” or “post-compromise security”), enabled by a technique called ratcheting in which session keys are updated with every message sent. We conduct a formal security analysis of Signal’s initial extended triple Diffie–Hellman (X3DH) key agreement and Double Ratchet protocols as a multi-stage authenticated key exchange protocol. We extract from the implementation a formal description of the abstract protocol and define a security model which can capture the “ratcheting” key update structure as a multi-stage model where there can be a “tree” of stages, rather than just a sequence. We then prove the security of Signal’s key exchange core in our model, demonstrating several standard security properties. We have found no major flaws in the design and hope that our presentation and results can serve as a foundation for other analyses of this widely adopted protocol.</description>
	<pubDate>Wed, 23 Sep 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/JC-CCDGS20</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/JC-CCDGS20</guid>
</item>

		
<item>
	<title>Research paper: Improved attacks against key reuse in learning with errors key exchange</title>
	<dc:creator>Nina Bindel, Douglas Stebila, Shannon Veitch</dc:creator>
	<description>Abstract: &lt;p&gt;Basic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers.  One example of this is Fluhrer&apos;s attack on the Ding, Xie, and Lin (DXL) LWE key exchange protocol, which exploits leakage from the signal function for error correction.  Protocols aiming to achieve security against active attackers generally use one of two techniques: demonstrating well-formed keyshares using re-encryption like in the Fujisaki–Okamoto transform; or directly combining multiple LWE values, similar to MQV-style Diffie–Hellman-based protocols.&lt;/p&gt;
&lt;p&gt;In this work, we demonstrate improved and new attacks exploiting key reuse in several LWE-based key exchange protocols.  First, we show how to greatly reduce the number of samples required to carry out Fluhrer&apos;s attack and reconstruct the secret period of a noisy square waveform, speeding up the attack on DXL key exchange by a factor of over 200.  We show how to adapt this to attack a protocol of Ding, Branco, and Schmitt (DBS) designed to be secure with key reuse, breaking the claimed 128-bit security level in under a minute.  We also apply our technique to a second authenticated key exchange protocol of DBS that uses an additive MQV design, although in this case our attack makes use of ephemeral key compromise powers of the eCK security model, which was not in scope of the claimed BR-model security proof.  Our results show that building secure authenticated key exchange protocols directly from LWE remains a challenging and mostly open problem.&lt;/p&gt;</description>
	<pubDate>Wed, 06 Oct 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/LATINCRYPT-BinSteVei21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/LATINCRYPT-BinSteVei21</guid>
</item>

		
<item>
	<title>Research paper: Towards post-quantum security for Signal&apos;s X3DH handshake</title>
	<dc:creator>Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Modern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The beauty of this primitive, among other things, is its potential reusage of key shares: DH shares can be either used once as an ephemeral key or used in multiple runs as a (semi-)static key. Since DH-based protocols are insecure against quantum adversaries, alternative solutions have to be found when moving to the post-quantum setting. However, most post-quantum candidates, including schemes based on lattices and even supersingular isogeny DH, are not known to be secure under key reuse. In particular, this means that they cannot be necessarily deployed as an immediate DH substitute in protocols.&lt;/p&gt;
&lt;p&gt;In this paper, we introduce the notion of a split key encapsulation mechanism (split KEM) to translate the desired properties of a DH-based protocol, namely contributiveness and key-reusability, to a KEM-based protocol flow. We provide the relevant security notions of split KEMs and show that the formalism lends itself to lift Signal&apos;s X3DH to the post-quantum KEM setting. While the proposed framework conceptually solves the raised issues, we did not succeed in providing a strongly-secure, post- quantum instantiation of a split KEM yet. The intention of this paper hence is to raise further awareness of the challenges arising when moving to KEM-based key exchange protocols with contributiveness and key-resusability, and to enable others to start investigating potential solutions.&lt;/p&gt;</description>
	<pubDate>Mon, 19 Oct 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/SAC-BFGJS20</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/SAC-BFGJS20</guid>
</item>

		
<item>
	<title>Presentation: Prototyping post-quantum crypto in software and Internet protocols</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Prototyping post-quantum crypto in software and Internet protocols, presented at NIST National Cybersecurity Center of Excellence Virtual Workshop on Considerations in Migrating to Post-Quantum Cryptographic Algorithms</description>
	<pubDate>Wed, 07 Oct 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20201007-NIST-NCCoE.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20201007-NIST-NCCoE.pdf</guid>
</item>

		
<item>
	<title>Research paper: A cryptographic analysis of the TLS 1.3 handshake protocol</title>
	<dc:creator>Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila</dc:creator>
	<description>Abstract: We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)DHE) key exchange), and the abbreviated resumption/&apos;PSK&apos; mode which uses a pre-shared key for authentication (with optional (EC)DHE key exchange and zero round-trip time key establishment). Our analysis in the reductionist security framework uses a multi-stage key exchange security model, where each of the many session keys derived in a single TLS 1.3 handshake is tagged with various properties (such as unauthenticated versus unilaterally authenticated versus mutually authenticated, whether it is intended to provide forward security, how it is used in the protocol, and whether the key is protected against replay attacks). We show that these TLS 1.3 handshake protocol modes establish session keys with their desired security properties under standard cryptographic assumptions.</description>
	<pubDate>Fri, 30 Jul 2021 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/JC-DFGS21</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/JC-DFGS21</guid>
</item>

		
<item>
	<title>Research paper: Efficient oblivious database joins</title>
	<dc:creator>Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client&apos;s encrypted data. One of the major obstacles to such a goal is the join operator, which is non-trivial to implement obliviously without resorting to generic but inefficient solutions like Oblivious RAM (ORAM).&lt;/p&gt; &lt;p&gt;We present an oblivious algorithm for equi-joins which (up to a logarithmic factor) matches the optimal &lt;i&gt;O&lt;/i&gt;(&lt;i&gt;n&lt;/i&gt; log &lt;i&gt;n&lt;/i&gt;) complexity of the standard non-secure sort-merge join (on inputs producing &lt;i&gt;O&lt;/i&gt;(&lt;i&gt;n&lt;/i&gt;) outputs). We do not use use expensive primitives like ORAM or rely on unrealistic hardware or security assumptions. Our approach, which is based on sorting networks and novel provably-oblivious constructions, is conceptually simple, easily verifiable, and very efficient in practice. Its data-independent algorithmic structure makes it secure in various different settings for remote computation, even in those that are known to be vulnerable to certain side-channel attacks (such as Intel SGX) or with strict requirements for low circuit complexity (like secure multiparty computation). We confirm that our approach is easily realizable through a compact prototype implementation which matches our expectations for performance and is shown, both formally and empirically, to possess the desired security characteristics.&lt;/p&gt;</description>
	<pubDate>Mon, 31 Aug 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/VLDB-KraKerSte20</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/VLDB-KraKerSte20</guid>
</item>

		
		
<item>
	<title>Blog post: Joint Statement on Contact Tracing</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Open letter from 300+ scientists from 25+ countries laying out 4 principles for open, transparent and private-by-design COVID-19 contact tracing systems, focusing on decentralised approaches to limit surveillance repurposing.</description>
	<pubDate>Mon, 20 Apr 2020 10:45:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/blog/archives/2020/04/20/contact-tracing-privacy/</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/blog/archives/2020/04/20/contact-tracing-privacy/</guid>
</item>

		
<item>
	<title>Research paper: Hybrid key exchange in TLS 1.3</title>
	<dc:creator>Douglas Stebila, Scott Fluhrer, Shay Gueron</dc:creator>
	<description>Abstract: Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken. It is motivated by transition to post-quantum cryptography. This document provides a construction for hybrid key exchange in the Transport Layer Security (TLS) protocol version 1.3.</description>
	<pubDate>Sun, 07 Sep 2025 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/draft-ietf-tls-hybrid-design</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/draft-ietf-tls-hybrid-design</guid>
</item>

		
		
<item>
	<title>Photo gallery: Netherlands • 2020</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Netherlands • 2020</description>
	<pubDate>Mon, 03 Feb 2020 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2020-netherlands</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2020-netherlands</guid>
</item>


		
<item>
	<title>Presentation: Exploring post-quantum cryptography in Internet protocols</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Exploring post-quantum cryptography in Internet protocols, presented at Netherlands Crypto Workshop</description>
	<pubDate>Fri, 07 Feb 2020 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20200207-Netherlands.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20200207-Netherlands.pdf</guid>
</item>

		
<item>
	<title>Research paper: Benchmarking post-quantum cryptography in TLS</title>
	<dc:creator>Christian Paquin, Douglas Stebila, Goutam Tamvada</dc:creator>
	<description>Abstract: &lt;p&gt;Post-quantum cryptographic primitives have a range of trade-offs compared to traditional public key algorithms, either having slower computation or larger public keys and ciphertexts/signatures, or both. While the performance of these algorithms in isolation is easy to measure and has been a focus of optimization techniques, performance in realistic network conditions has been less studied. Google and Cloudflare have reported results from running experiments with post-quantum key exchange algorithms in the Transport Layer Security (TLS) protocol with real users&apos; network traffic. Such experiments are highly realistic, but cannot be replicated without access to Internet-scale infrastructure, and do not allow for isolating the effect of individual network characteristics.&lt;/p&gt;
&lt;p&gt;In this work, we develop and make use of a framework for running such experiments in TLS cheaply by emulating network conditions using networking features of the Linux kernel. Our testbed allows us to independently control variables such as link latency and packet loss rate, and then examine the impact on TLS connection establishment performance of various post-quantum primitives, specifically hybrid elliptic curve/post-quantum key exchange and post-quantum digital signatures, based on implementations from the Open Quantum Safe project. Among our key results, we observe that packet loss rates above 3-5% start to have a significant impact on post-quantum algorithms that fragment across many packets, such as those based on unstructured lattices. The results from this emulation framework are also complemented by results on the latency of loading entire web pages over TLS in real network conditions, which show that network latency hides most of impact from algorithms with slower computations (such as supersingular isogenies).&lt;/p&gt;</description>
	<pubDate>Wed, 15 Apr 2020 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/PQCrypto-PaqSteTam20</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/PQCrypto-PaqSteTam20</guid>
</item>

		
<item>
	<title>Research paper: Proc. 26th Annual Conference on Selected Areas in Cryptography (SAC) 2019</title>
	<dc:creator></dc:creator>
	<description>Abstract: </description>
	<pubDate>Tue, 31 Dec 2019 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/SAC2019</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/SAC2019</guid>
</item>

		
<item>
	<title>Presentation: Exploring post-quantum cryptography in Internet protocols</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Exploring post-quantum cryptography in Internet protocols, presented at Grenoble Alpes Cybersecurity Institute Workshop on Post-Quantum Cryptography</description>
	<pubDate>Tue, 17 Dec 2019 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20191217-Univ-Grenoble.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20191217-Univ-Grenoble.pdf</guid>
</item>

		
<item>
	<title>Presentation: Exploring post-quantum cryptography in Internet protocols</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Exploring post-quantum cryptography in Internet protocols, presented at IBM Research Zurich</description>
	<pubDate>Fri, 13 Dec 2019 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20191213-IBM-Zurich.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20191213-IBM-Zurich.pdf</guid>
</item>

		
<item>
	<title>Research paper: Protocols for Authentication and Key Establishment, Second Edition</title>
	<dc:creator>Colin Boyd, Anish Mathuria, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications.&lt;/p&gt;
&lt;p&gt;In this edition the authors introduced new chapters and updated the text throughout in response to new developments and updated standards. The first chapter, an introduction to authentication and key establishment, provides the necessary background on cryptography, attack scenarios, and protocol goals. A new chapter, computational security models, describes computational models for key exchange and authentication and will help readers understand what a computational proof provides and how to compare the different computational models in use. In the subsequent chapters the authors explain protocols that use shared key cryptography, authentication and key transport using public key cryptography, key agreement protocols, the Transport Layer Security protocol, identity-based key agreement, password-based protocols, and group key establishment.&lt;/p&gt;
&lt;p&gt;The book is a suitable graduate-level introduction, and a reference and overview for researchers and practitioners with 225 concrete protocols described. In the appendices the authors list and summarize the relevant standards, linking them to the main book text when appropriate, and they offer a short tutorial on how to build a key establishment protocol. The book also includes a list of protocols, a list of attacks, a summary of the notation used in the book, general and protocol indexes, and an extensive bibliography.&lt;/p&gt;</description>
	<pubDate>Thu, 07 Nov 2019 00:00:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/BMS19</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/BMS19</guid>
</item>

		
<item>
	<title>Photo gallery: Oman • 2019</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Oman • 2019</description>
	<pubDate>Sun, 25 Aug 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2019-oman</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2019-oman</guid>
</item>


		
<item>
	<title>Presentation: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH, presented at NIST 2nd Post-Quantum Cryptography Standardization Conference 2019, Santa Barbara, California</description>
	<pubDate>Thu, 22 Aug 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20190822-NIST.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20190822-NIST.pdf</guid>
</item>

		
<item>
	<title>Research paper: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH</title>
	<dc:creator>Eric Crockett, Christian Paquin, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those algorithms into standards for communication protocols and other parts of the IT infrastructure. In this paper, we explore how two major Internet security protocols, the Transport Layer Security (TLS) and Secure Shell (SSH) protocols, can be adapted to use post-quantum cryptography.&lt;/p&gt;
&lt;p&gt;First, we examine various design considerations for integrating post-quantum and hybrid key exchange and authentication into communications protocols generally, and in TLS and SSH specifically.  These include issues such as how to negotiate the use of multiple algorithms for hybrid cryptography, how to combine multiple keys, and more.  Subsequently, we report on several implementations of post-quantum and hybrid key exchange in TLS 1.2, TLS 1.3, and SSHv2. We also report on work to add hybrid authentication in TLS 1.3 and SSHv2.  These integrations are in Amazon s2n and forks of OpenSSL and OpenSSH; the latter two rely on the liboqs library from the Open Quantum Safe project.&lt;/p&gt;</description>
	<pubDate>Fri, 19 Jul 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/NISTPQC-CroPaqSte19</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/NISTPQC-CroPaqSte19</guid>
</item>

		
<item>
	<title>Presentation: Hybrid key exchange in TLS 1.3</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Hybrid key exchange in TLS 1.3, presented at IETF 105, Montreal, Canada</description>
	<pubDate>Thu, 25 Jul 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/files/research/presentations/20190725-IETF.pdf</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/files/research/presentations/20190725-IETF.pdf</guid>
</item>

		
		
<item>
	<title>Photo gallery: Munich, Germany • 2019</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>Photo gallery: Munich, Germany • 2019</description>
	<pubDate>Fri, 24 May 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/pictures/2019-germany</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/pictures/2019-germany</guid>
</item>


		
<item>
	<title>Blog post: NIST Post-Quantum Crypto Standardization project round 2</title>
	<dc:creator>Douglas Stebila</dc:creator>
	<description>The United States National Institute of Standards and Technology (NIST) is currently running a multi-year standardization project for post-quantum cryptography.  Today, NIST announced the schemes that have made it to round 2 of the competition.  Below is my categorization of the round 2 schemes.</description>
	<pubDate>Wed, 30 Jan 2019 15:36:00 -0500</pubDate>
	<link>http://www.douglas.stebila.ca/blog/archives/2019/01/30/nist-round-2/</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/blog/archives/2019/01/30/nist-round-2/</guid>
</item>

		
<item>
	<title>Research paper: Hybrid key encapsulation mechanisms and authenticated key exchange</title>
	<dc:creator>Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila</dc:creator>
	<description>Abstract: &lt;p&gt;Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transition applications from classical to quantum-resistant solutions. One approach to mitigate the risk of quantum attacks and to preserve common security guarantees are hybrid schemes, which combine classically secure and quantum-resistant schemes. Various academic and industry experiments and draft standards related to the Transport Layer Security (TLS) protocol already use some form of hybrid key exchange; however sound theoretical approaches to substantiate the design and security of such hybrid key exchange protocols are missing so far.&lt;/p&gt;
&lt;p&gt;We initiate the modeling of hybrid authenticated key exchange protocols. We consider security against adversaries with varying levels of quantum power over time, such as adversaries who may become quantum in the future or are quantum in the present. We reach our goal using a three-step approach: First, we introduce security notions for key encapsulation mechanisms (KEMs) that enable a fine-grained distinction between different quantum scenarios. Second, we propose several combiners for constructing hybrid KEMs that correspond closely to recently proposed Internet-Drafts for hybrid key exchange in TLS 1.3. Finally, we present a provably sound design for hybrid key exchange using KEMs as building blocks.&lt;/p&gt;</description>
	<pubDate>Fri, 10 May 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/PQCrypto-BBFGS19</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/PQCrypto-BBFGS19</guid>
</item>

		
<item>
	<title>Research paper: NewHope</title>
	<dc:creator>Erdem Alkim, Roberto Avanzi, Joppe W. Bos, Léo Ducas, Antonio de la Piedra, Peter Schwabe, Douglas Stebila, Martin R. Albrecht, Emmanuela Orsini, Valery Osheter, Kenneth G. Paterson, Guy Peer, Nigel P. Smart</dc:creator>
	<description>Abstract: &lt;p&gt;NewHope is a key-exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE) problem, which was submitted to the NIST post-quantum crypto project. The submission proposes four different instantiations:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;NewHope512-CPA-KEM and NewHope1024-CPA-KEM, which are IND-CPA-secure key encapsulation mechanisms which target level 1 and level 5, respectively, in the NIST call for proposals (matching or exceeding the brute-force security of AES-128 and AES-256, respectively)&lt;/li&gt; &lt;li&gt;NewHope512-CCA-KEM and NewHope1024-CCA-KEM, which are IND-CCA-secure key encapsulation mechanisms which target level 1 and level 5, respectively, in the NIST call for proposals (matching or exceeding the brute-force security of AES-128 and AES-256, respectively)&lt;/li&gt; &lt;/ul&gt;</description>
	<pubDate>Sat, 30 Mar 2019 00:00:00 -0400</pubDate>
	<link>http://www.douglas.stebila.ca/research/papers/NIST-NewHope-20190330</link>
	<guid isPermaLink="true">http://www.douglas.stebila.ca/research/papers/NIST-NewHope-20190330</guid>
</item>

	</channel>
</rss>
