Lunch Lecture – Mathematics
Title: Mathematics of Post-Quantum Cryptography
Abstract: Quantum computers are now on the horizon, and with them comes a new world of computation. While the physics of quantum computing in the real world is still in progress, mathematicians and computer scientists have been designing algorithms and protocols for quantum computers. These new quantum algorithms break current cryptographic protocols, opening the door for new cryptographic protocols which will be safe against both quantum and classical attacks. In this talk, we will explain the mathematics underlying one potential direction for post-quantum cryptography: Isogeny-based cryptography. After some background on elliptic curves and isogenies, we will describe an algorithm for an isogeny-based key exchange and compare this protocol to the current standards.