Golden gate bridge catacrypt logo
October 29, 2014 - San Francisco
iceberg - wikipedia (source)
Home      Committees      Call for contributions      Program (schedule)      Venue      Registration      Stipends      Documents and links      Contact

IEEE logoIEEE CNS 2014 Workshop on

catastrophic events related to CRYPTography

and security with their possible solutions



Home

Committees
Call for contributions
Program (schedule)
 
Venue
Registration
Stipends

Documents and links

Contact

Sponsors

data:image/jpeg;base64,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

 VRSN_logo_vertical_CMYK
V


Your logo here

Scope and call for full papers and for informal contributions

A workshop about catastrophic events related to cryptography and security. And their prevention, detection, recovery, solutions ...

The main point is: many cryptographic protocols are only based on the security of one cryptographic algorithm (e.g. RSA) and  we don't know the exact RSA security (including Ron Rivest). What if somebody finds a  clever and fast factoring algorithm? Well, it is indeed an hypothesis but we know several  instances of possible progress. A new fast algorithm is a possible catastroph if not handled  properly. And there are other problems with hash functions, elliptic curves, aso. Think also about the recent Heartbleed bug (April 2014, see http://en.wikipedia.org/wiki/Heartbleed): the discovery was very late and we were close to a catastrophic situation.

So we are thinking about a regular workshop, the name is CATACRYPT, about these possible problems and their solutions. It includes problems with cryptographic algorithms, protocols, PKI, DRM, TLS-SSL, smart cards, RSA dongles, MIFARE, aso. Quantum computing, resilience and agility are also on the program.

The workshop aims at bringing together researchers and practitioners working in cryptography and security, from academia and industry. A large committee including many founders of the main concepts of public-key cryptography is pushing this important topic.

Format

The workshop will consist of invited keynote presentations, full papers, informal contributions, panels, rump session and discussions. There will be IEEE formal proceedings only for full papers. This possibility is open for the invited talks.

Keynote Speakers
Martin E. Hellman (Professor Emeritus of Electrical Engineering, Stanford University)
    Prolonging the Life of Public Key Cryptography
This talk argues that prudence would require public key cryptography to use much larger key sizes than are typically used. It also shows how seemingly unforeseen advances in factoring and discrete logs might be forseeable. It then examines what we might do to ensure a higher level of security, and why barriers to achieving more robust security may be more psychological than technical.
Nancy Leveson (MIT)
    Protecting Against Broken Cryptography through Systems Thinking

Final panel
Peter G. Neumann (SRI, comp.risks) and others
Risks of CataCryptic Event

Important Key Dates for submissions

All full papers will be submitted via EDAS. The authors need to follow the formatting guidelines of IEEE CNS regular papers available on the main conference website IEEE Conference on Communications and Network Security (CNS2014) http://cns2014.ieee-cns.org/content/submission-instructions-1 See also Call for contributions.

Informal contributions are also welcome any time before October 1st, 2014.


full papers (IEEE)
                    informal contributions                     
Submission deadline    June 26, 2014 (updated)
   any time before October 1st
Acceptance notifications    July 5, 2014
   two weeks after submission

Camera-ready version for full paper

   July 11, 2014
   not applicable
Workshop date    October 29, 2014
   October 29, 2014

Organization

The workshop chair is Jean-Jacques Quisquater (UCLouvain, Louvain-la-Neuve, Belgium)