This course offers an in-depth introduction to post-quantum cryptography, the emerging cryptographic standard in secure communication that will soon complement classical cryptography worldwide. You will explore the main techniques for designing and analyzing post-quantum cryptosystems, while tackling the challenges posed by their complex mathematics, larger key sizes, higher communication costs, and the need to defend against quantum adversaries.
Structured into five modules, each featuring lectures and hands-on exercises, the course offers practical experience through Python programming. You’ll gain a deeper understanding of the concepts while experimenting with the design and cryptanalysis of these cryptosystems.
Here’s what you’ll cover:
- Introduction to Post-Quantum Cryptography & Hash-Based Signatures
- Multivariate Cryptography & Algebraic Attacks
- Code-Based Cryptography & Collision-Based Attacks
- Lattice-Based Cryptography & Fiat-Shamir Signatures
- Isogeny-Based Cryptography & Quantum Algorithms for Cryptography
Learning objectives
After this course, you will be able to:
- Recognize, define and describe post-quantum cryptographic schemes;
- Understand the design principles of the different families of post-quantum cryptography
- Understand the ideas and mathematics behind post-quantum cryptography
- Analyze the security of the different families of post-quantum cryptography
- Apply learned design and cryptanalytic techniques in new situations and to different schemes
- Evaluate the applicability of cryptanalytic and optimization techniques in different contexts