Maksim Iavich
Professor, Head of cyber security direction at Caucasus University, President Scientific Cyber Security Association (SCSA)
SPEAKER INTERVIEW AVAILABLEBIOGRAPHY
Maksim Iavich is PH.D. in mathematics and professor of computer science. He is CEO & President of Scientific Cyber Security Association (SCSA). Maksim is affiliate professor and the head of cyber security direction in Caucasus University. Maksim is cyber security consultant in Georgian and international organizations. He uses to be the invited speaker at international cyber security conferences and is the organizer of many scientific cyber security events. He has scientific awards in cyber security field. Maksim is the author of many scientific papers. The topics of the papers are: cyber security, cryptography, post-quantum cryptography, quantum cryptography, mathematical models and simulations.
Post quantum digital signature with OQRNG (optical quantum random number generator)
Google Corporation, NASA and the Universities Space Research Association (USRA) have teamed up with D-Wave, the manufacturer of quantum processors. Quantum computers will be able to break most, if not absolutely all conventional cryptosystems, that are widely used in practice, for example RSA.
Hash-based digital signature schemes offer an alternative. Like any other digital signature scheme, hash-based digital signature schemes use a cryptographic hash function. Their security relies on the collision resistance of that hash function.
In 1979 Ralph Merkle proposed Merkle signature scheme. Merkle signature scheme has efficiency problems, so it cannot be used in practice. World scientists are working on improving the scheme. One of the improvements is integrating PRNG not to calculate and store large amount of one-time keys pairs. This approach cannot be considered secure, because according to our research quantum computers are able to crack PRNG, which were considered safe against attacks of classical computers.
Pseudorandom number generators are widely used in Cryptography. This type of PRNGs are called cryptographically secure pseudorandom number generators CSPRNGs.
In the work it is offered to use hash based pseudo random number generator and the optical quantum random number generator for generating the seed.
As a CSPRNG in Merkle we offer an algorithm, based on a hash function. NIST has recommended two continuous hash based PRNGs: HASH_DBRG and HMAC_DBRG. We offer to use HASH_DBRG, as it is more efficient.
We offer to use physical quantum random number generator (QRNG) for generating the seed for HASH_DBRG.
In 1961 the researchers offered to use quantum phenomena as a source of randomness. Radioactive decay was a particularly accessible source of true randomness. Geiger-Muller tubes were already sensitive enough to capture and amplify α, β and γ radiation, well-characterized radioactive samples were available. Almost all radioactivity-based QRNGs were based on the detection of β radiation.
In a Geiger-Muller detector a single particle makes an ionization event, that is amplified in a Townsend avalanche. Any concrete atom’s probability to decay in a time interval (t, t + dt) can be presented as exponential random variable Pr(t)dt = λne^(−λnt)dt, where λn is a decay constant.
Time of arrival generators are the representatives of optical quantum random number generators (OQRNGs). The detector receives photons from LED incoherent light and from the coherent states from a laser in an exponentially distributed time λe−λt , where λ is an average number of photons per second. The time between two detections is exponential, as it is the difference of two exponential random variables. We can compare the differences of the time between the arrival of consecutive pulses, we will get two time differences t1 and t2, so we can compare them also. In order to get the random bit, if t1 > t0, we assign a 1 and if t0 > t1, we can assign a 0. We offer to use this time arrival generator as a seed of HASH_DBRG.
During the presentation the new scheme will be represented , and the attacks on it will be analyzed.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Tiberiu Boros
Software Developer / Computer Scientist Adobe
Raphael Robert
Head of Security Wire Swiss GmbH
Steve McGregory
Senior Director, Threat Intelligence Ixia, a Keysight Business
SPEAKER INTERVIEW AVAILABLEReady for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business.
Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance.
In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.