Maksim Iavich

CEO and President Scientific Cyber Security Association

BIOGRAPHY

Maksim Iavich is PH.D. in mathematics and professor of computer science. He is CEO & President of Scientific Cyber Security Association (SCSA). Maksim is affiliate professor and the head of cyber security direction in Caucasus University. Maksim is cyber security consultant in Georgian and international organizations. He uses to be the invited speaker at international cyber security conferences and is the organizer of many scientific cyber security events. He has scientific awards in cyber security field. Maksim is the author of many scientific papers. The topics of the papers are: cyber security, cryptography, post-quantum cryptography, quantum cryptography, mathematical models and simulations.

Lattice based Merkle for post-quantum epoch

Scientists are actively working on the creation of quantum computers. Quantum computers can easily solve the problem of factoring the large numbers. Because of this, quantum computers are able to break the crypto system RSA, which is used in many products.
Hash based digital signatures are also the alternative of RSA. These systems use cryptographic hash function. The security of these systems depends on the resistance to collisions of the hash functions that they use. In the paper are analyzed hash based digital signature schemes, one time ones and Merkle. It is shown, that hash and one way functions must be used a lot of times during the implementation of hash based digital signature schemes. Great attention must be paid on security and efficiency of these functions. Hash functions are considered resistant to quantum computer attacks, but the Grover algorithm allows us to achieve quadratic acceleration in the search algorithms. It means that hash functions must be complicated to be secure against quantum computers attacks. Studies are conducted to determine the cost of attacks on SHA2 and SHA3 families of hash functions, using the Grover algorithm.
It is recommended to use lattice based constructions for one way and hash functions. Lattice based crypto systems are one of the alternatives of RSA. These crypto systems have very reliable security evidence based on “worst-case hardness” and are resistant to attacks of quantum computers. The security of lattice based crypto system is based on the complexity of lattice problems, the main one of which is the shortest vector (SVP) problem.
We propose to use as the hash function, the lattice-based hash function, and to use lattice based one-way function as an one-way function in hash-based digital signature schemes.
The family of one-way functions, suggested by Ajtai, can be used. In the case of hash functions, as the key, we select the matrix K from Zn×ma, which transforms mlog b into nlog a number of bits and we calculate h(x) = Kx mod a.
In the case of a one-way function, we select the matrix K from Zm×mb, as the key. It transforms mlog b into mlog b number of bits and we compute f(x) = Kx mod a.
In this version, it is proposed to use the one-way functions offered by Ajtai, it can be considered as the initial idea. It is worth considering the idea of using optimized one-way lattice based functions.
As the results we get secure hybrid of lattice based and hash based crypto system, that can be used in post-quantum epoch. The work was conducted as a part of joint project of Shota Rustaveli National Science Foundation and Science & Technology Center in Ukraine, Project N6321 [contract № STCU-2016-08]

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Dmitry Sklyar

Application Security Specialist Kaspersky Lab

SPEAKER INTERVIEW AVAILABLE

Ivan Petrov

Penetration Tester TAD Group

Muhammad Mudassar Yamin

Research Fellow Norwegian University of Science and Technology

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is the leader of the local telecom market and part of the Orange Group, one of the largest global telecommunications operators, connecting hundreds of millions of customers worldwide. With over 11 million customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions to its customers, both individual users and companies, from basic services up to complete voice services, fixed and mobile data, TV services or smart home services, but also mobile financial services. Orange is also a leader in innovation investing yearly over 200 million euros in network infrastructure and R&D initiatives in Romania. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally. 

Orange Services was created in 2013 and is a 100% owned subsidiary of Orange Group. As a technology services company, our DNA is in IT, but our teams also work in other domains including mobile networks and a number of commercial and business functions. Orange Services is one of the largest technology hubs in the Orange Group, working internationally for both Orange corporate functions and country operations. Through a unique combination of cutting edge know-how and expertise, our teams provide a broad range of services: development and supervision of IT services in domains such as Big Data, Cloud, M2M, IoT, TV, Connected Objects; design and development of IT infrastructure and desktop solutions; testing & planning for mobile networks; implementation of supply chain solutions and also improvement of commercial & business performance including BI, CRM, Analytics, Digital learning and Customer Care. Visit us on LinkedIn.

Gold Partners

Silver Partners

 

        

Bronze Partner

 

HACKING VILLAGE PARTNERS

COMMUNITY & MEDIA PARTNERS