2024Activity reportProject-TeamCOSMIQ
RNSR: 201923488C- Research center Inria Paris Centre
- Team name: Code-based Cryptology, Symmetric Cryptology and Quantum Information
- Domain:Algorithmics, Programming, Software and Architecture
- Theme:Algorithmics, Computer Algebra and Cryptology
Keywords
Computer Science and Digital Science
- A1.2.8. Network security
- A3.1.5. Control access, privacy
- A4. Security and privacy
- A4.2. Correcting codes
- A4.3. Cryptography
- A4.3.1. Public key cryptography
- A4.3.2. Secret key cryptography
- A4.3.3. Cryptographic protocols
- A4.3.4. Quantum Cryptography
- A6.2.3. Probabilistic methods
- A7.1. Algorithms
- A7.1.4. Quantum algorithms
- A8.1. Discrete mathematics, combinatorics
- A8.6. Information theory
Other Research Topics and Application Domains
- B6.4. Internet of things
- B6.5. Information systems
- B9.5.1. Computer science
- B9.5.2. Mathematics
- B9.10. Privacy
1 Team members, visitors, external collaborators
Research Scientists
- Jean-Pierre Tillich [Team leader, INRIA, Senior Researcher, HDR]
- Anne Canteaut [INRIA, Senior Researcher, HDR]
- Andre Chailloux [INRIA, Researcher]
- Pascale Charpin [INRIA, Emeritus, HDR]
- Gaetan Leurent [INRIA, Senior Researcher, from Oct 2024, HDR]
- Gaetan Leurent [INRIA, Researcher, until Sep 2024, HDR]
- Anthony Leverrier [INRIA, HDR]
- María Naya Plasencia [INRIA, Senior Researcher, HDR]
- Leo Perrin [INRIA, Researcher]
- Nicolas Sendrier [INRIA, Senior Researcher, HDR]
Faculty Member
- Laura Luzzi [ENSEA, Associate Professor Delegation, from Sep 2024, HDR]
Post-Doctoral Fellow
- Thomas Van Himbeeck [INRIA, Post-Doctoral Fellow, from Sep 2024]
PhD Students
- Sacha Baillarguet-Gajic [INRIA, from Oct 2024]
- Antoine Bak [DGA, from Sep 2024]
- Augustin Bariant [ANSSI, until Jun 2024]
- Jules Baudrin [INRIA]
- Agathe Blanvillain [INRIA]
- Aurelien Boeuf [INRIA]
- Bruno Costa Alves Freire [PASQAL, CIFRE, from Oct 2024]
- Aurélie Denys [Quandela, until Mar 2024]
- Merlin Fruchon [DGA, from Sep 2024]
- Virgile Guemard [INRIA]
- Valerian Hatey [ENSEA]
- Guilhem Jazeron [INRIA, from Oct 2024]
- Axel Lemoine [DGA]
- Dounia M'Foukh [INRIA]
- Antoine Mesnard [INRIA, from Nov 2024]
- Charles Meyer-Hilfiger [INRIA]
- Bastien Michel [INRIA, from Oct 2024]
- Samuel Novak [INRIA, from Nov 2024]
- Clement Poirson [ALICE ET BOB, CIFRE, from Oct 2024]
- Magali Salom [THALES, CIFRE, from Oct 2024]
Interns and Apprentices
- Sacha Baillarguet-Gajic [INRIA, Intern, from Mar 2024 until Aug 2024]
- Antoine Bak [INRIA, Intern, from Mar 2024 until Aug 2024]
- Bruno Costa Alves Freire [INRIA, Intern, from May 2024 until Sep 2024]
- Merlin Fruchon [INRIA, Intern, from Mar 2024 until Aug 2024]
- Cyprien Gauthier [INRIA, Intern, from May 2024 until Jul 2024]
- Florent Mazelet [INRIA, from Oct 2024]
- Antoine Mesnard [INRIA, Intern, from Mar 2024 until Sep 2024]
- Bastien Michel [INRIA, Intern, from Mar 2024 until Aug 2024]
Administrative Assistants
- Christelle Guiziou [INRIA]
- Christelle Rosello [INRIA]
External Collaborators
- Augustin Bariant [ANSSI, from Sep 2024]
- Christina Boura [UVSQ]
- Kevin Carrier [CY CERGY PARIS UNIV, from Mar 2024]
- Yann Rotella [UVSQ]
- Valentin Vasseur [THALES]
- Thomas Vidick [CALTECH]
2 Overall objectives
The research within the project-team is related to cryptography and more generally to protection of information, be it classical or quantum. In a nutshell, the overall goal within our project-team is to cover the following classical and quantum aspects of cryptology, together with the specific area of quantum codes:
-
-
new cryptanalysis, classical or quantum, in symmetric and asymmetric cryptography,
-
-
new designs of classical symmetric and asymmetric primitives or quantum primitives that are resistant against a classical and quantum adversary,
-
-
design of quantum codes allowing for efficient fault-tolerant quantum computation.
3 Research program
3.1 Quantum algorithms and cryptanalysis
Well-analyzed mathematical problems such as integer factorization or the discrete logarithm problem, that have been the foundations of asymmetric cryptographic for many years, were found to be easily solved with Shor's algorithm by a quantum computer. This has prompted the community to actively search for alternatives and the NIST to launch in 2017 a still ongoing competition aiming at standardizing the most suitable candidates. Even if the proposed solutions to this competition have good reasons to be believed resistant to a quantum computer, they often have a rich mathematical structure that makes them tantalizing targets for quantum speedups that go beyond the usual Grover/quantum-walk speedups. The recent work of Chen, Liu and Zhandry on solving LWE in superposition (Eurocrypt 2022) is a good illustration of this potential. It gives a quantum polynomial time algorithm of the Short Integer Solution (SIS) problem for some parameters seemingly unreachable for classical computers. The SIS problem appears in lattice-based cryptography and while this does not break current proposals for lattice-based cryptography, it shows that even computational assumptions believed to be secure against quantum computers are at risk with quantum algorithms going way beyond Shor's algorithm.
On the other hand, symmetric cryptography, essential for enabling secure communications, used to seem much less affected at first sight: the biggest known threat was Grover's algorithm, which allows exhaustive key searches in the square root of the normal complexity. Thus, it was believed that doubling key-lengths suffices to maintain an equivalent security in the post-quantum world, but this has changed since our project QUASYModo.
Indeed, our results have shown that both for symmetric and asymmetric cryptography, the impact of quantum computers goes well beyond Grover's and Shor's algorithms and has to be studied carefully in order to understand if a given cryptographic primitive is secure or not in a quantum world. To correctly evaluate the security of cryptographic primitives in the post-quantum world, it is really desirable to elaborate a quantum cryptanalysis toolbox. This whole thread of research, that needs to combine techniques from symmetric or asymmetric cryptanalysis together with quantum algorithmic tools, came naturally in our team which is composed of symmetric and asymmetric cryptologists as well as of experts in quantum computing. We have exploited this unique opportunity to become one of the leading research teams in the field. We have also managed to pass on the interest and the focus in this research direction to other international groups that have recently published some interesting new results on quantum cryptanalysis, like: G. Leander and A. May (U. Bochum), T. Iwata (U. Nagoya), Y. Sasaki and A. Hosoyamada (NTT), Xiaoyun Wang et al. (Tsinghua U, Beijing), Li Yang et al. (Chinese academy of science)...
3.2 Symmetric cryptology
Symmetric techniques are widely used because they are the only ones that can achieve some major features such as high-speed or low-cost encryption, fast authentication, and efficient hashing. It is a very active research area which is stimulated by a pressing industrial demand for low-cost implementations. Even if the block cipher standard AES remains unbroken 25 years after its design, it clearly appears that it cannot serve as a Swiss Army knife in all environments. In particular an important challenge raised by several new applications is the design of symmetric encryption schemes with some additional properties compared to the AES, either in terms of implementation performance (low-cost hardware implementation, low latency, resistance against side-channel attacks...) or in terms of functionalities. The past decade has then been characterized by a multiplicity of new proposals and evaluating their security has become a primordial task which requires the attention of the community.
This proliferation of symmetric primitives has been amplified by public competitions, including the recent NIST lightweight standardization effort, which have encouraged innovative but unconventional constructions in order to answer the harsh implementation constraints. These promising but new designs need to be carefully analyzed since they may introduce unexpected weaknesses in the ciphers. Our research work captures this conflict for all families of symmetric ciphers. It includes new attacks and the search for new building blocks which ensure both a high resistance to known attacks and a low implementation cost. This work, which combines cryptanalysis and the theoretical study of discrete mathematical objects, is essential to progress in the formal analysis of the security of symmetric systems.
Our specificity, compared to most groups in the area, is that our research work tackles all aspects of the problem, from the practical ones (new attacks, concrete constructions of primitives and low-cost building-blocks) to the most theoretical ones (study of the algebraic structure of underlying mathematical objects, definition of optimal objects). We study these aspects not separately but as several sides of the same domain.
3.3 Post-quantum asymmetric cryptology
Current public-key cryptography is particularly threatened by quantum computers, since almost all cryptosystems used in practice rely on related number-theoretic security problems that can be easily solved on a quantum computer as shown by Shor in 1994. This very worrisome situation has prompted NIST to launch a standardization process in 2017 for quantum-resistant alternatives to those cryptosystems. This concerns all three major asymmetric primitives, namely public-key encryption schemes, key-exchange protocols and digital signatures. The NIST has made it clear that for each primitive there will be several selected candidates relying on different security assumptions. It publicly admits that the evaluation process for these post-quantum cryptosystems is significantly more complex than the evaluation of the SHA-3 and AES candidates for instance.
There were 69 (valid) submissions to this call in November 2017, with numerous lattice-based, code-based and multivariate-cryptography submissions and some submissions based either on hashing or on supersingular elliptic curve isogenies. In January 2019, 26 of these submissions were selected for the second round and 7 of them are code-based submissions. In July 2020, 15 schemes were selected as third round finalists/alternate candidates, 3 of them are code-based. In July 2022, the NIST announced the first candidates to be standardized: one lattice-based encryption/KEM and three digital signature schemes (two lattice-based and one hash based). Meanwhile four encryption/KEM schemes (three code-based and one isogeny based) which were still under discussion advanced to the fourth round. The lack of diversity among the signatures left in the process prompted the NIST to suggest to the community to propose in June 2023 additional signature schemes relying on other security assumptions than the ones that have been selected. Forty additional submissions of this kind were accepted in July.
The research of the project-team in this field is focused on the design and cryptanalysis of cryptosystems making use of coding theory and we have proposed code-based candidates to the NIST call for the first two types of primitives, namely public-key encryption and key-exchange protocols and have two candidates among the finalists/alternate candidates. We also submitted Wave to the second call of signature schemes and are involved in the submussion MIRA, PERK and RYDE. The last three made it to the second round in 2024.
3.4 Quantum information
The field of quantum information and computation aims at exploiting the laws of quantum physics to manipulate information in radically novel ways. There are two main applications:
-
(i)
quantum computing, that offers the promise of solving some problems that seem to be intractable for classical computers such as for instance factorization or solving the discrete logarithm problem;
-
(ii)
quantum cryptography, which provides new ways to exchange data in a provably secure fashion. For instance it allows key distribution by using an authenticated channel and quantum communication over an unreliable channel with information-theoretic security, in the sense that its security can be proven rigorously by using only the laws of quantum physics, even with all-powerful adversaries.
Our team deals with quantum coding theoretic issues related to building a large quantum computer and with quantum cryptography. If these two questions may seem at first sight quite distinct, they are in fact closely related in the sense that they both concern the protection of (quantum) information either against an adversary in the case of quantum cryptography or against the environment in the case of quantum error-correction. This connection is actually quite deep since an adversary in quantum cryptography is typically modeled by a party having access to the entire environment. The goals of both topics are then roughly to be able to measure how much information has leaked to the environment for cryptography and to devise mechanisms that prevent information from leaking to the environment in the context of error correction.
While quantum cryptography is already getting out of the labs, this is not yet the case of quantum computing, with large quantum computers capable of breaking RSA with Shor's algorithms maybe still decades away. The situation is evolving very quickly, however, notably thanks to massive public investments in the past couple of years and all the major software or hardware companies starting to develop their own quantum computers. One of the main obstacles towards building a quantum computer is the fragility of quantum information: any unwanted interaction with the environment gives rise to the phenomenon of decoherence which prevents any quantum speedup from occurring. In practice, all the hardware of the quantum computer is intrinsically faulty: the qubits themselves, the logical gates and the measurement devices. To address this issue, one must resort to quantum fault-tolerance techniques which in turn rely on the existence of good families of quantum error-correcting codes that can be decoded efficiently. Our expertise in this area lies in the study of a particularly important class of quantum codes called quantum low-density parity-check (LDPC) codes. The LDPC property, which is well-known in the classical context where it allows for very efficient decoding algorithms, is even more crucial in the quantum case since enforcing interactions between a large number of qubits is very challenging. Quantum LDPC codes solve this issue by requiring each qubit to only interact with a constant number of other qubits.
4 Application domains
4.1 Designing, Analyzing and Choosing Cryptographic Standards
The research community is strongly involved in the development and evolution of cryptographic standards. Many standards are developed through open competitions (e.g. AES, SHA-3) where multiple teams propose new designs, and a joint cryptanalysis effort allows to select the most suitable proposals. The analysis of established standards is also an important work, in order to depreciate weak algorithms before they can be exploited. Several members of the team have been involved in this type of effort and we plan to continue this work to ensure that secure algorithms are widely available. We believe that good cryptographic standards have a large socio-economic impact, and we are active in proposing schemes to future competitions, and in analyzing schemes proposed to current or future competitions, as well as widely-used algorithms and standards.
We have been involved in the two standardization efforts run by NIST for post-quantum cryptography and lightweight cryptography. We have also uncovered potential backdoors in two algorithms from the Russian Federation (Streebog and Kuznyechik), and successfully presented the standardization of the latter by ISO. We have also implemented practical attacks against SHA-1 to speed-up its deprecation.
NIST post-quantum competition.
The NIST post-quantum competition1 aims at standardizing quantum-safe public-key primitives. It is really about offering a credible quantum-safe alternative for the schemes based on number theory which are severely threatened by the advent of quantum computers. We are involved in two of the three candidates which remain in the fourth round of the competition. In 2020, we obtained a significant breakthrough in solving more efficiently the MinRank problem and the decoding problem in the rank metric 56, 57 by using algebraic techniques. This had several consequences: all second round rank metric candidates were dismissed from the third round (including our own candidate) and it was later found out that this algebraic algorithm could also be used to attack the third round multivariate finalist, namely Rainbow and the alternate third round finalist GeMSS. Various algebraic techniques were also developed to attack the McEliece cryptosystem 60, 14, 59 or for related schemes based on other families of algebraic codes 58. Even if these algebraic techniques are right now not a threat against the NIST fourth-round finalist 55ClassicMcEliece, they indeed show that the square-code based distinguisher of high-rate Goppa codes or alternant codes that we devised in our project ten years ago, can indeed be transformed in most of the cases into an actual attack on a McEliece scheme based on them. This is not a threat though on the ClassicMcEliece proposal, because the rate of the code used there is not high enough to be in the distinguishable regime. However in 59, we have significantly enlarged the region of rates where there is a rather efficient distinguisher thanks to a novel concept, namely associating to a code a space of quadratic forms containing very low rank quadratic forms if the code is a Goppa code. This paves the way for new algebraic attacks on the McEliece cryptosystem.
NIST competition on lightweight symmetric encryption.
The NIST lightweight cryptography standardization process2 is an initiative to develop and standardize new authenticated encryption algorithms suitable for constrained devices. As explained in Subsection 3.2, there is a real need for new standards in lightweight cryptography, and the selected algorithms are expected to be widely deployed within the Internet of Things, as well as on more constrained devices such as contactless smart cards, or medical implants. The NIST received 56 submissions in February 2019, three of which, including one of 10 finalists, have been co-designed by members of the team.
Monitoring Current Standards
While we are very involved in the design phase of new cryptographic standards (see above), we also monitor the algorithms that are already standardized. In practice, this work has two sides.
First, we work towards the deprecation of algorithms known to be unsage. Unfortunately, even when this fact is known in the academic community, standardizing bodies can be slow to implement the required changes to their standards. This prompted for example G. Leurent to implement even better attacks against SHA-1 to illustrate its very practical weakness, and L. Perrin and X. Bonnetain (then a COSMIQ member) to find simple arguments proving that a subfunction used by the current Russian standards was not generated randomly, despite the claims of its authors.
Second, it also means that we participate to the relevant ISO meetings discussing the standardization of cryptographic primitives (JC27/WG2), and that we follow the discussions of the IETF and IRTF on RFCs. We have also provided technical assistance to members of other standardizing bodies such as the ETSI.
4.2 Large scale deployment of quantum cryptography
Major academic and industrial efforts are currently underway to implement quantum key distribution at large scale by integrating this technology within existing telecommunication networks. Colossal investments have already taken place in China to develop a large network of several thousand kilometers secured by quantum cryptography, and there is little doubt that Europe will follow the same strategy, as testified by the current European projects CiViQ (in which we are involved), OpenQKD and the future initiative Euro-QCI (Quantum Communication Infrastructure). While the main objectives of these actions are to develop better systems at lower cost and are mainly engineering problems, it is crucial to note that the security of the quantum key distribution protocols to be deployed remains far from being completely understood. For instance, while the asymptotic regime of these protocols (where one assumes a perfect knowledge of the quantum channel for instance) has been thoroughly studied in the literature, it is not the case of the much more relevant finite-size regime accounting for various sources of statistical uncertainties for instance. Another issue is that compliance with the standards of the telecommunication industry requires much improved performances compared to the current state-of-the-art, and this can only be achieved by significantly tweaking the original protocols. It is therefore rather urgent to better understand whether these more efficient protocols remain as secure as the previous ones. Our work in this area is to build upon our own expertise in continuous-variable quantum key distribution, for which we have developed the most advanced security proofs, to give security proofs for the protocols used in this kind of quantum networks.
5 Social and environmental responsibility
5.1 Impact of research results
Our project is still involved in the NIST competition for standardizing quantum-safe cryptosystems where we have two fourth-round finalists. The outcome of these two candidates will have a strong impact since the standardized solutions will likely replace large parts of the world’s infrastructure underpinning secure global communication.
6 Highlights of the year
6.1 Lowlights
Note : Readers are advised that the Institute does not endorse this text in the “Highlights of the year” section, which is the sole responsibility of the team leader.
At the end of 2024, Inria's top management enacted a new “contrat d'objectifs, de moyens et de performance” (COMP), which defines Inria's objectives for the period 2024–2028. We are very concerned about the content of this document and the way it was imposed.
- Neither the staff nor their representative bodies were given the opportunity to participate in (or influence) the drafting of this document.
- The document announces the creation of a funding agency within Inria. France already has an independent funding agency, the ANR. The creation of a new funding agency within a research institute is unnecessary and a waste of resources. It is also likely to create confusion, opacity, and conflicts of interest.
- Staff opposition to these policies, which has been expressed in several votes and petitions, has been largely ignored.
Moreover, this document envisions a series of deep transformations that go against Inria attractiveness and threaten its rank among the world-class research institution such as
- The document defines Inria's main mission as “contributing to the digital sovereignty of the Nation through research and innovation” and proposes to amend Inria's founding decree to reflect this new definition.
- Many aspects of the document reflect a desire to drive research in a top-down manner, for example through the selection of “strategic partner institutions” and “strategic themes”. This threatens the fundamental freedom of researchers to choose their research topics and collaborations.
We also point out that it is essential for our team to appear as a team that is independent from military or governmental influences. This is essential for having the right to propose cryptographic primitives at NIST competitions for instance and for our credibility to provide an unbiased and independent assessment of cryptographic primitives. The changes suggested in the COMP may seriously jeopardize our work in this respect.
6.2 Promotion and hiring
Gaëtan Leurent defended his Habilitation à diriger les recherches “Symmetric Cryptanalysis Beyond Primitives” 47 on Jan 18, 2024. He was promoted to senior researcher (Directeur de recherche) the same year.
Mike Vasmer a specialist of quantum error codes and fault tolerant quantum computing has been hired this year on an Inria Starting Faculty Position (ISFP). He will join us on January 2025.
6.3 Awards and Prizes
-
IACR fellow.
Anne Canteaut became in 2024 an IACR Fellow for influential contributions to symmetric cryptography and Boolean functions, and for exemplary service to the symmetric cryptography community.
-
French Academy of Sciences.
Anne Canteaut was elected at the French Academy of Sciences.
-
Le Point 100 top scientists and inventors of 2024.
Marìa Naya-Plasencia is among the 100 top scientists and inventors chosen by the magazine "Le Point" in 2024.
-
FSE 2024 Best Paper Award
The paper Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES, by A. Boeuf, A. Canteaut and L. Perrin received the best paper award from the conference FSE 2024.
6.4 Grants
SoBaSyC.
María Naya-Plasencia has obtained a European Consolidator Grant called "SOlid BAsis for Symmetric Cryptography"
In the past two decades, symmetric cryptography has experienced significant advancements owing to standardisation efforts. However, the security of cryptography hinges on cryptanalysis, necessitating ongoing scrutiny to instil confidence in cryptographic functions. The ERC-funded SoBaSyC project aims to establish a robust foundation for symmetric cryptography by consolidating insights amassed over the years regarding various attack methods, refining them through an algorithmic approach, and optimising their application. This endeavour will culminate in the development of a toolbox featuring newly proposed and optimised algorithms, capable of executing the most effective known attacks on a given construction. Additionally, the project will derive theoretical bounds and properties from this algorithmic methodology, thereby enhancing confidence and efficiency while saving time.
6.5 Cryptographic challenges
Poseidon challenges.
In late 2024, the Ethereum foundation issued some "bounties" for the cryptanalysis of a hash function called Poseidon. Their goal is to better understand the security provided by this primitive since they intend to rely on it to secure their products. To this end, and to better understand the practical aspects of cryptanalysis in general, they organized a public competition inviting external cryptographers to try to break some specific instances of the (round-reduced) hash function; a higher number of rounds meaning a higher reward. They estimated the security level of their targets using state-of-the-art techniques, and posted the resulting bounties on their website url. Aurélien Bœuf, Antoine Bak and Guilhem Jazeron collaborated with Augustin Bariant (from ANSSI) and his student (Maël Hostettler) to solve many of these bounties. In particular, they had to invent new improvements to algebraic attacks based on polynomial resultants; these will be the topic of a conference or journal submission later in 2025. In the end, this team has claimed about 40k$ of bounties.
TII McEliece challenge.
The McEliece cryptosystem is the oldest public key encryption scheme that is potentially resistant to a quantum computer. The Technology Innovation Institute launched in 2023 a series of challenges to identify possible weaknesses in it and/or confirm its strength. The prize for the theoretical track was awarded to Alain Couvreur (Grace project-team), Rocco Mora and Jean-Pierre Tillich. This work provided a novel theoretical to distinguish McEliece public keys from random data for some parameter instances of the cryptosystem. It was recognized by TII that the ideas developed in this work are intriguing and appealing for further developments. It significantly improves the state-of-the-art distinguishers for the Goppa codes that are used in the McEliece cryptosystem. They have been awarded the full prize of US$10,000.
7 New results
7.1 Quantum algorithms and cryptanalysis
Participants: Agathe Blanvillain, André Chailloux, María Naya-Plasencia, Jean-Pierre Tillich.
We have kept on working on generic quantum algorithms related to cryptanalysis, and in addition, have devised some new algorithms showing a quantum advantage for solving approximate interpolation problems.
7.2 Symmetric cryptology
Participants: Sacha Baillarguet-Gajic, Antoine Bak, Augustin Bariant, Jules Baudrin, Aurélien Boeuf, Anne Canteaut, Pascale Charpin, Merlin Fruchon, Guilhem Jazeron, Gaëtan Leurent, Dounia M'Foukh, Bastien Michel, María Naya-Plasencia, Clara Pernot, Léo Perrin.
Our recent results in symmetric cryptography concern either the security analysis of existing primitives, or the design of new primitives. This second topic includes some work on the construction and properties of suitable building-blocks for these primitives, e.g. on the search of highly nonlinear functions.
7.3 Post-quantum asymmetric cryptology
Participants: André Chailloux, Loïc Demange, Valerian Hatey, Axel Lemoine, Laura Luzzi, Antoine Mesnard, Charles Meyer-Hilfiger, Magali Salom, Nicolas Sendrier, Jean-Pierre Tillich.
Our work in this area is mainly focused on code-based cryptography, but some of our contributions, namely algebraic attacks, have applications in multivariate cryptography or in algebraic coding theory. Many contributions relate to the NIST call for postquantum primitives, either cryptanalysis or design.
We have also been organizing since 2015 a working group held every month or every two months on code-based cryptography that structures the French efforts on this topic: every meeting is attended by most of the groups working in France on this topic (project-team GRACE, University of Bordeaux, University of Limoges, University of Rennes and University of Rouen).
7.4 Quantum information
Participants: André Chailloux, Bruno Costa Alves Freire, Aurélie Denys, Virgile Guémard, Thomas Van Himbeeck, Anthony Leverrier, Samuel Novak, Clement Poirson.
Most of our work in quantum information deals with either quantum algorithms, quantum error correction or cryptography.
8 Bilateral contracts and grants with industry
Participants: Anthony Leverrier, Nicolas Sendrier.
8.1 Bilateral grants with industry
-
Thalès (10/2024 -> 9/2027) Funding for the supervision of Magali Salom PhD.
45 kEuros.
-
Alice & Bob (11/2024 -> 10/2024) Funding for the supervision of Clément Poirson's PhD.
45 kEuros.
-
Pasqal (11/2024 -> 10/2024) Funding for the supervision of Bruno C. A. Freire's PhD.
45 kEuros.
9 Partnerships and cooperations
9.1 International initiatives
9.1.1 Inria associate team not involved in an IIL or an international program
COSINUS
-
Title:
Collaboration On Secrecy to Investigate New USe
-
Duration:
2023 ->
-
Coordinator:
Carlos Cid (carlos@simula.no)
-
Partners:
- Simula (Norvège)
-
Inria contact:
Leo Perrin
-
Summary:
The aim of the COSINUS associated team is for the COSMIQ team and the cryptography group at Simula to join forces to work on an emerging trend in symmetric cryptography, namely "arithmetization-orientation". A primitive such as a hash function is said to be arithmetization-oriented if, in a nut-shell, it lends itself well to an implementation as an arithmetic circuit. This requirement implies significant changes for the symmetric primitives, one of the main ones being that of the underlying alphabet: rather than CPU instructions operating over bitstrings, arithmetization-oriented primitives rely on finite field operations (addition, multiplication), where the finite field has a large (often prime) size.
The final outcome of this collaboration is expected to be a new family of arithmetization-oriented symmetric primitives that significantly outperforms the state-of-art, as well as a deeper understanding of the security of the primitives of this type.
9.2 International research visitors
9.2.1 Visits of international scientists
Inria International Chair
Participants: Thomas Vidick.
Other international visits to the team.
November 25-29: visit of researchers from Simula UiB (Bergen, Norway) to Paris within the framework of the associate team COSINUS. Carlos Cid, Atharva Phanse, Havard Radum, Irati Manterola Ayala, Morten Oygarden.
9.2.2 Visits to international teams
Research stays abroad
Antoine Bak , Aurelien Boeuf , Leo Perrin
-
Visited institution:
Simula UiB, Bergen
-
Country:
Norway
-
Dates:
May 27-31
-
Context of the visit:
within the framework of the associate team COSINUS
Anthony Leverrier
-
Visited institution:
Simons Institute, Berkeley
-
Country:
USA
-
Dates:
February 5-16
-
Context of the visit:
invitation to the Quantum Algorithms, Complexity, and Fault Tolerance and Error-Correcting Codes: Theory and Practice programs
Jean-Pierre Tillich
-
Visited institution:
Simons Institute, Berkeley
-
Country:
USA
-
Dates:
February 11-April 26
-
Context of the visit:
invitation to the Quantum Algorithms, Complexity, and Fault Tolerance and Error-Correcting Codes: Theory and Practice programs
9.3 European initiatives
9.3.1 Horizon Europe
ReSCALE
ReSCALE project on cordis.europa.eu
-
Title:
Reinventing Symmetric Cryptography for Arithmetization over Large fiElds
-
Duration:
From September 1, 2022 to August 31, 2027
-
Partners:
- INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET AUTOMATIQUE (INRIA), France
-
Inria contact:
Leo Perrin
-
Coordinator:
Leo Perrin
-
Summary:
"Symmetric cryptography is finding new uses because of the emergence of novel and more complex (e.g. distributed) computing environments.
These are based on sophisticated zero-knowledge and Multi-Party Computation (MPC) protocols, and they aim to provide strong security guarantees of types that were unthinkable before. In particular, they make it theoretically possible to prove that a computation was done as claimed by those performing it without revealing its inputs or outputs. This would make it possible e.g. for e-governance algorithms to prove that they are run honestly; and overall would increase the trust we can have in various automated processes.
The security techniques providing these guarantees are sequences of operations in a large finite field GF(q), where typically q>24. However, these procedures also rely on hash functions and other ""symmetric"" cryptographic algorithms that are defined over GF(2}={0,1}. But encoding GF(2) operations using GF(q) operations is very costly: relying on standard hash functions leads to significant performance overhead, to the point were the protocols mentioned before are unusable in practice.
In order to alleviate this bottleneck, it is necessary to devise symmetric algorithms that are natively described in GF(q). This change requires great care: some hash functions described in GF(q) have already been presented, and subsequently exhibited significant flaws. The inherent structural differences between GF(2) and GF(q) are the cause behind these problems: our understanding of the construction of symmetric primitives in GF(2) does not carry over to GF(q).
With this project, I will bring symmetric cryptography into GF(q) in a safe and efficient way. To this end, I will rebuild the analysis tools and methods that are used both by designers and attackers. This project will naturally lead to the design of new algorithms whose adoption will be simplified by the efficient and easy-to-use software libraries we will provide."
SoBaSyC
SoBaSyC project on cordis.europa.eu
-
Title:
Solid Basis for Symmetric Cryptography
-
Duration:
From April 1, 2024 to March 31, 2029
-
Partners:
- INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET AUTOMATIQUE (INRIA), France
-
Inria contact:
María Naya-Plasencia
-
Coordinator:
María Naya-Plasencia
-
Summary:
Symmetric cryptography, essential for enabling secure communications, has benefited from an explosion of new results in the last two decades, in big part due to several standardization efforts: many public competitions have been launched since 1997, where the community proposes cryptographic constructions and simultaneously evaluates their security and performance. The security of symmetric cryptography is based on cryptanalysis: we only gain confidence in a symmetric cryptographic function through extensive and continuous scrutiny.
However, the current context has not allowed the community to digest all the new findings, as can be seen from several recurrent issues. The two main ones are:
1) primitives proposed at top-tier venues often get broken by slight modifications of already known techniques;
2) published cryptanalysis at top conferences sometimes include mistakes or are suboptimal. They are also often re-invented and re-named.
The main challenge of SoBaSyC is to establish solid bases for symmetric cryptography. Using cryptanalysis as the starting point, my aim is to unify the knowledge obtained through the years on the different families of attacks, to transform it with an algorithmic approach and to endow it with optimizations. The final result will be a toolbox congregating all our newly proposed optimized algorithms, that will provide the best known attacks on a given construction, through an easy application. Next, I plan to derive from this algorithmic approach some theoretical bounds, as well as some properties that I will include in the security proofs of symmetric constructions, providing more meaningful and realistic security arguments.
This would allow, for the first time, to ensure that any newly proposed primitive or construction is already resistant to all known attacks, and will considerably increase the confidence on these functions. It will also save a considerable amount of time and allow the field to advance, at last, on solid ground.
9.4 National initiatives
-
ANR SWAP (02/22→01/26)
Sboxes for Symmetric-Key Primitives
ANR Program: AAP Générique 2021
Partners: UVSQ (coordinateur), Inria COSMIQ, ANSSI, CryptoExperts, Univ. of Rouen, Univ. of Toulon.
172 kEuros
Sboxes are small nonlinear functions that are crucial components of most symmetric-key designs and their properties are highly related to the security of the overall construction. The development of new attacks has given rise to many Sbox design criteria. However, the emerge of new contexts, applications and environments requires the development of new design criteria and strategies. The SWAP project aims first at investigating such criteria for emerging use cases like whitebox cryptography, fully homomorphic encryption and side-channel resistance. Then, we wish for analyzing the impact of these particular designs on cryptanalysis and see how the use of Sboxes with some special mathematical structures can accelerate some known attacks or introduce new ones. Finally, we aim at studying Sboxes from a mathematical point of view and provide new directions to the Big APN problem, an old conjecture on the existence of a particular type of optimal permutations.
-
CRYPTANALYSE (10/23
09/28)Cryptanalysis of classical cryptographic primitives
ANR Program: AAP PEPR Cybersécurité
Partners: COSMIQ (coordinator), CARAMBA (coordinator), LFANT, LIRMM, IRISA, LMV, MIS, LIP6, LJK
605 kEuros (Total amount: 5 MEuros)
This is one of the ten projects within the Program on Cybersecurity(url), funded by the French investment plan, France 2030. This project brings together the main French research groups working on cryptanalysis. It will study simultaneously the most widely used cryptographic primitives, the more recent primitives which have been around for a shorter time or which are within the long process of academic approval or standardisation, and finally the project also studies specialized primitives which are designed for some specific application contexts. In all cases, the main goal is to provide accurate hardness estimations for the underlying problems and, ultimately, a good understanding of the security level, both for symmetric and for asymmetric primitives. Software tools, which will be made openly available when appropriate, are bound to play a key role in this work. This project will advance the state of the art in cryptanalysis, and eventually increase the security of primitives used today and in the future.
-
ANR EPIQ (01/22
12/27)Quantum Software - Study of the quantum stack: Algorithm, models, and simulation for quantum computing
ANR Program: PEPR on Quantum Technologies
Partners: MOCQA(coordinator), COSMIQ, CEA (LIST, IPHT,MEM), Inria (Paris, Bordeaux, Nancy, Lyon, Rennes, Saclay), University of Aix-Marseille (LIS), University of Bordeaux (LABRI), University of Bourgogne and Franche Comté (ICB), University of Grenoble (LPMMC,NEEL), University of Paris (IRIF), Sorbonne University (LIP6),
230 kEuros
The purpose of this project is (i) to understand the advantages and limits of quantum computing via both quantum complexity research and the discovery and enhancement of algorithms, (ii) to define the framework for quantum computation using high-level languages, comparison of computational models as well as using their relations for program optimization, (iii) develop simulation tools to anticipate the performances of algorithms on noisy quantum machines. We are involved in studying the limits of quantum algorithms in cryptanalysis.
-
ANR NISQ2LSQ (01/22
12/27)From NISQ to LSQ: Bosonic and LDPC codes
ANR Program: PEPR on Quantum Technologies
Partners: COSMIQ (coordinator), Inria (Paris, Nancy, Lyon, Saclay), SPEC/CEA Saclay, PHELIQS/ CEA Grenoble, LPMMC, ENS Lyon, LPTHE, Alice
Bob, C2N, Majulab, LCF, LIP6, LKB, MPQ, Quandela, Institut de Mathématiques de Bordeaux, CEA-LETI, GR2IF, XLIM420 kEuros
This project aims at accelerating the R
D efforts in the theory and conception of hardware-efficient fault- tolerant quantum codes. As far as codes are concerned, the project focuses on two of the most promising solutions, namely bosonic codes and Low-Density Parity-Check (LDPC) codes. On the hardware side, the targeted platforms are superconducting qubits and photonic ones. -
ANR TLS-PQ (01/22
12/26)Post-quantum padlock for web browser
ANR Program: PEPR on Quantum Technologies
Partners: CAPSULE(coordinator), COSMIQ, Inria (Paris, Bordeaux, Nancy, Lyon, Rennes, Saclay), CEA-LETI, University of Bordeaux (TDN), University of Caen (AMACC), University of Limoges (Cryptis), University of Rouen (CA), University of Saint-Etienne (SESAM), University of Versailles (Cryptis), ARCAD
430 kEuros
This integrated project aims to develop in 5 years post-quantum primitives in a prototype of « post-quantum lock » that will be implemented in an open-source browser. We are involved in developing code-based solutions and analyzing the security of the proposed algorithms.
-
Q-LOOP (01/24
12/29)Préparer le contrôle commande de l'ordinateur quantique ANR program on Quantum Technologies
Patners: CEA, IRT, CNRS, Inria, Siemens, A&B, C12, Quandela, Quobly 120 kEuros
This project aims at building a portfolio of HW and SW technologies enabling the control at large scale of emerging solid state qubits technologies e.g. Superconducting cat qubits, semiconductor qubits (carbon nanotubes, spin qubits) and photonic qubits in development by emerging industrial actors. The project will cover a large span of technologies ranging from cryo-electronics to real time error correction under a system approach encompassing the development of models for control chains enabling the exploration of various architectures and leading to demonstration of solutions representative of future scaling requirements.
10 Dissemination
10.1 Promoting scientific activities
10.1.1 Scientific events: selection
Chair of conference program committees
- WCC 2024 (M. Naya-Plasencia)
Steering Committees
- Fast Software Encryption (FSE) G. Leurent (member since 2019)
- Post-quantum cryptography (PQCrypto), N. Sendrier, J.-P. Tillich
- Workshop on Coding and Cryptography (WCC), P. Charpin, N. Sendrier, J.-P. Tillich
Member of the conference program committees
-
Anne Canteaut:
- Eurocrypt 2024
- Crypto 2024
-
Gaëtan Leurent:
- Crypto 2024
- Eurocrypt 2025
-
Anthony Leverrier:
- QIP 2025
-
Marìa Naya-Plasencia:
- Eurocrypt 2024 (area chair)
-
Léo Perrin:
- CFAIL 2024
-
Nicolas Sendrier:
- Indocrypt 2024
- PQCrypto 2024, 2025
- SAC 2024
- WCC 2024
-
Jean-Pierre Tillich:
- AAC 2024
- WCC 2024
- PQCrypto 2024, 2025
- Eurocrypt 2025
10.1.2 Journal
Member of the editorial boards
- Advances in Mathematics for Communications, associate editors : N. Sendrier (since 2018), J.-P. Tillich (since 2017)
- Applicable Algebra in Engineering, Communication and Computing, associate editor: A. Canteaut (since 2016)
- Designs, Codes and Cryptography, associate editor: P. Charpin (since 2003)
- Finite Fields and Their Applications, associate editors: A. Canteaut, P. Charpin (since 2013)
- IACR Transactions on Symmetric Cryptology, A. Canteaut (2024), M. Naya-Plasencia (2024), G. Leurent (2024)
- IEEE Transactions on Information Theory, A. Canteaut: area editor (since 2021), A. Leverrier: associate editor (since 2023)
- Journal of Cryptology, A. Canteaut (since 2021)
10.1.3 Invited talks
- A. Canteaut, Minimalistic Key Schedules and Their Impact on Security, Lorenz Center workshop "Beating Real-Time Crypto", NL, April 21-26, 2024.
- A. Canteaut, Minimalism in Symmetric Cryptography, Journées Nationales du GDR Sécurité Informatique, Rennes, June 10-12, 2024.
- A. Leverrier, Quantum Tanner codes, International Congress on Mathematical Physics (ICMP), Strasbourg, France, July 1-5, 2024.
- A. Leverrier, Quantum Tanner codes, QTech 2024, Berlin, Germany, September 10-12, 2024.
- G. Leurent, Cryptanalysis Beyond Primitives, Fast Software Encryption Conference, Leuven, Belgium, March 25-29, 2024.
Workshops with invitation:
- A. Canteaut, Minimalism in symmetric cryptography, Journées Numération Arithmétique Cryptographie, Sorbonne Univ., Paris, Feb. 29- March 1 2024.
- A. Leverrier, Bosonic (And Other) Codes With Interesting Logical Gate Sets, Simons Institute, Berkeley, USA, February 12-16, 2024.
- A. Leverrier, Quantum error-correcting codes with a covariant encoding, workshop on Quantum Error Correction, IMSI, Chicago, USA, November 11-14, 2024.
As a result of her Irène Joliot-Curie award, Anne Canteaut has been an invited speaker at a number of universities and institutions:
- ENS Lyon, seminar of the Department of Computer Science, March 20, 2024
- Académie des Technologies, Paris, March 13, 2024.
- Académie des Sciences, Paris, May 14, 2024
- Keynote at IP Paris PhD Graduation Ceremony, A. Canteaut, May 17, 2024 url
- "From cryptanalysis to lightweight cryptography: the best defence is a good offence", Univ. of Toulon, Sept. 13, 2024, url
- "Search for optimal functions over finite fields for symmetric cryptography", Colloquium of the Laboratoire JA Dieudonné, Nice, October 14, 2024
10.1.4 Leadership within the scientific community
Panel discussions organized by the scientific community:
- Academy of Technologies, "How to promote and strenghten the role of women in industry and technology companies", Paris, March 13, 2024: A. Canteaut url
- CrossFyre'24, Panel Discussion on Gender-related Issues, Zurich, Switzerland, May 25, 2024: A. Canteaut url
- Eurocrypt'24, Panel Discussion on Publications, Zurich, Switzerland, May 25, 2024: A. Canteaut (moderator), G. Leurent (panelist) url
- GHTC'24, Panel discussion on How to improve our peer review and revision system, Santa Barbara, USA, August 17, 2024: G. Leurent (panelist) url
10.1.5 Research administration
-
Committees for the selection of professors, assistant professors and researchers
- Université de Picardie Jules Verne, Amiens, assistant professor, A. Canteaut (May 2024)
- DTU Compute, Tenure Track, Denmark, A. Canteaut (March 2024)
- Inria Grenoble, Junior Research Scientists (CR/ISFP): G. Leurent (2024)
- Inria, Researchers with disabilities (CRCN-TH): G. Leurent (2024)
-
Other responsabilities
- International Scientific Advisory Board of the Flemish Strategic Research Program on Cybersecurity: A. Canteaut (since 2019)
- Member of the evaluation panel of the Department of Mathematics at Aalborg University, Denmark, April-May 2024: A. Canteaut
- Member of the steering committee of PCQT (Paris Center for Quantum Technologies): A. Chailloux (since 2024)
- Elected member in the Inria Evaluation Committee: G. Leurent (since September 2023)
- Member of the steering committee of the Domaine d'Intérêt Majeur SIRTEQ: A. Leverrier (since 2018)
- coordinator of the Inria challenge EQIP on Quantum Technologies: A. Leverrier (since 2021)
- Member of the scientific board of the GdR IQFA: A. Leverrier (since 2019)
- Member of the International peer review panel: Mathematics, Statistics, Computer and Data Sciences, Human Computer Interaction of the Independent Research Fund Denmark (DFF), : M. Naya-Plasencia (since 2025)
- Member of the Comité Égalité-Parité of the GT-C2: L. Perrin (since 2023)
-
Local committees
- G. Leurent is a member of the IT Users Commission (CUMI-R)
- G. Leurent is a member of the Comité de Centre
- M. Naya-Plasencia is the president of the Commission pour l'Emploi Scientifique
- L. Perrin is a member of the Commission pour l'Emploi Scientifique (since 2024)
10.2 Teaching - Supervision - Juries
10.2.1 Teaching
- Master: A. Canteaut, Error-correcting codes and applications to cryptology, 12 hours, M2, University Paris-Cité (MPRI), France;
- Master: A. Chailloux, Quantum Circuits and Logic Gates, 12 hours, M1, Sorbonne Université
- Master: A. Chailloux, Quantum information, 12 hours, M2, University Paris-Cité (MPRI), France;
- Master: A. Chailloux, Quantum algorithms, 4 hours, M2, Ecole Normale Supérieure de Lyon, France;
- Master: A. Leverrier, Quantum information, 12 hours, M2,University Paris-Cité (MPRI), France;
- Master: L. Perrin, Application Web et Sécurité, 24 hours, M1, UVSQ, France;
- Bachelor: L. Perrin, Cryptographie, 29 hours, L3, UVSQ, France;
- Master: A. Canteaut, On-line lecture on Lightweight symmetric primitives, in De Cifris Trends in Modern Cryptography: the French magisterium, Univ. Trento, url
- Master: L. Perrin, On-line lecture on Symmetric Techniques for Advanced Protocols: Design Strategies, and Cryptanalysis, in De Cifris Trends in Modern Cryptography: the French magisterium, Univ. Trento, url
Anne Canteaut has provided training for several audiences:
- on cryptography at École de Guerre, Paris with X. Leroy (EPI Cambium), organized by Académie des Sciences, Nov. 2024;
- on research in digital science, at Institut National du Service Public, Paris.
10.2.2 Supervision
- PhD: Loïc Demange, BIKE implementation: vulnerabilities and countermeasures, January 26, supervisor: N. Sendrier.
- PhD: Clara Pernot, Conception et analyse de chiffrements par bloc, Université Paris Cité, February 2, supervisors: G. Leurent, M. Naya Plasencia.
- PhD: Aurélie Denys, Security proofs for continuous variable quantum cryptography protocols, Sorbonne Université, April 5, supervisor: A. Leverrier.
- PhD: Augustin Bariant, Analysis of AES-based and arithmetization-oriented symmetric cryptography primitives, June 24, supervisor: G. Leurent.
- PhD: Jules Baudrin, Propriétés algébriques de chiffrements symétriques et de leurs composants non-linéaires, Sorbonne Université, December 6, supervisors: A. Canteaut, L. Perrin.
- PhD in progress: Charles Meyer-Hilfiger, Cryptographie post-quantique : Conception, analyse et mise œuvre d'algorithmes de décodage générique, since November 2021, supervisor: N. Sendrier.
- PhD in progress: Aurelien Boeuf, Analyse de la sécurité de primitives symétriques “Orientées Arithmétisation”, since October 2022, supervisors: A. Canteaut, L. Perrin.
- PhD in progress: Virgile Guémard, Quantum LDPC codes, since November 2022, supervisor: A. Leverrier.
- PhD in progress: Dounia M'Foukh, Symmetric cryptography, since September 2023, supervisor: M. Naya Plasencia.
- PhD in progress: Agathe Blanvillain, The quantum decoding problem, since October 2023, supervisor: J.-P. Tillich.
- PhD in progress: V. Hatey, The decoding problem and attacks on FHE protocols, since October 2023, supervisor: L. Luzzi.
- PhD in progress: Axel Lemoine, Algebraic attacks on the McEliece cryptosystem, since October 2023, supervisor: J.P. Tillich.
- PhD in progress: Sacha Baillarguet-Gajic, Improving key-recovery attacks, since October 2024, supervisor: M. Naya-Plasencia.
- PhD in progress: Antoine Bak, since October 2024, supervisors: L. Perrin and A. Canteaut.
- PhD in progress: Bruno Costa Alves Freire, Quantum LDPC codes, since October 2024, supervisor: A. Leverrier.
- PhD in progress: Merlin Fruchon, Towards a better understanding of the security of symmetric primitives, since October 2024, supervisor: A. Canteaut.
- PhD in progress: Bastien Michel, Automatization of attacks, since October 2024, supervisor: M. Naya-Plasencia.
- PhD in progress: Clément Poirson, Bosonic codes, since October 2024, supervisor: A. Leverrier.
- PhD in progress: Magali Salom, Side-channel attacks and implementation of code-based cryptographic schemes, since October 2024, supervisor: N. Sendrier.
- PhD in progress: Antoine Mesnard, Code based cryptographic schemes, since November 2024, supervisor: N. Sendrier.
- PhD in progress: Samuel Novak, Fault tolerant homological codes, since November 2024, supervisor: A. Leverrier.
- PhD in progress: Louis Paletta, Autonomous quantum error correction with cat qubits, since October 2022, supervisors: A. Leverrier, M. Mirrahimi, A. Sarlette, C. Vuillot;
- PhD in progress: Guilhem Jazeron, Cryptanalyse algébrique de primitives symétriques destinées au protocoles avancés, since October 2024, supervisors: L. Perrin and G. Leurent
10.2.3 Juries
- G. Leurent, Symmetric Cryptanalysis Beyond Primitives, HDR, Sorbonne Université, January 18, committee: A. Canteaut;
- A. Denys, Quantum key distribution and quantum error correction with bosonic systems, Sorbonne Université, April 5, committee: A. Leverrier (supervisor);
- A. Bariant, Analysis of AES-based and arithmetization-oriented symmetric cryptography primitives, Sorbonne Université, June 24, committee: A. Canteaut, G. Leurent (supervisors);
- C. Pernot, Conception et analyse de chiffrements par blocs, Univ. Paris Cité, committee: M. Naya-Plasencia, G. Leurent (supervisors)
- P. Fallahpour, Lattice-based cryptography in a quantum setting : security proofs and attacks, Ecole Normale Supérieure de Lyon, July 5, committee: J.-P. Tillich (reviewer);
- B. Tran, Post-Quantum Code-Based Cryptography, Ecole polytechnique fédérale de Lausanne, September 20, committee: J.-P. Tillich (reviewer);
- R. Heim-Boissier, Symmetric cryptanalysis: from primitives to modes, Université de Versailles, October 13, committee: A. Canteaut (reviewer);
- M. Funk, Algorithmes et outils pour la cryptanalyse des primitives symétriques, Université de Versailles, October 12, committee: M. Naya-Plasencia;
- J. du Crest, Efficient Message-Passing Decoding of Quantum LDPC Codes, Université Grenoble Alpes, November 4, committee: A. Leverrier (reviewer);
- A. Mehrdad, Trail Search Discovering the Perfect Path for Adventure, Radboud University, The Netherlands, November 15, committee: M. Naya-Plasencia (reviewer).
- M. Eichlseder, Secure Lightweight Cryptography, TU Graz, December 2, committee: M. Naya-Plasencia (reviewer);
- J. Baudrin, Algebraic properties of symmetric ciphers and of their non-linear components, Sorbonne Université, December 6, committee: A. Canteaut, Léo Perrin (supervisors);
- E. Burle, Cryptographie basée sur les codes : des instances difficiles pour les problèmes de décodage, Université de Rouen, December 10, committee: N. Sendrier (reviewer), J.-P. Tillich.
10.3 Popularization
10.3.1 Participation in Live events
- Matinale de Radio Classique, April 17, 2024, A. Canteaut url
- BSmart TV, "La grande interview", May 2024, A. Canteaut url
- France Culture, "La science CQFD", Anne Canteaut : la crypto joue des codes, June 2024, url
General-audience talks:
- Séminaire "Sciences et société", Nancy, A. Canteaut, April 18, 2024, url
- Salon Jeux et Culture Mathématique, Paris, A. Canteaut, May 23, 2024
- Festival "Sur les épaules des géants", Le Havre, A. Canteaut, September 26-28, 2024 url
- Conférence du Labo Maths, La Châtre (36), A. Canteaut, October 3, 2024 url
- Passions Culture, Étaples sur mer (62), A. Canteaut, November 19, 2024 url
Panel discussions:
- Soirée inspirante Femmes en sciences, Fondation de l'Université d'Angers, A. Canteaut, June 25, 2024
Talks in high-schools (collèges and lycées)
- Lycée Condorcet, Paris, A. Canteaut, January 20, 2024
- Collège Anne Frank, Sauzé-Vaussais (79), A. Canteaut, April 5, 2024
- Lycée Montaigne, Paris, A. Canteaut, May 7, 2024
- Finale du concours AlKindi, CNAM, Paris, A. Canteaut, May 22, 2024.
- Institution Saint-Joseph, Le Havre, A. Canteaut, September 26, 2024
- Collège G. Sand, La Châtre (36), A. Canteaut, October 3, 2024
- Lycée G. Sand, La Châtre (36), A. Canteaut, October 4, 2024
- Collège Eugène Delacroix, Roissy-en-Brie, A. Canteaut, November 25, 2024
- RJMI, Inria Paris, A. Canteaut, October 22, 2024
Our research activities have received significant media attention, and raised several general-audience papers, for instance
11 Scientific production
11.1 Major publications
- 1 inproceedingsProving Resistance Against Invariant Attacks: How to Choose the Round Constants..Crypto 2017 - Advances in Cryptology10402LNCS - Lecture Notes in Computer ScienceSteven MyersSanta Barbara, United StatesSpringerAugust 2017, 647--678HALDOI
- 2 articleOn CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting.Finite Fields and Their Applications56March 2019, 209-246HALDOI
- 3 inproceedingsAn Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.Asiacrypt 2017 - Advances in Cryptology10625 LNCS - Lecture Notes in Computer ScienceHong Kong, ChinaSpringerDecember 2017, 211--240HALDOI
- 4 articleArbitrarily Long Relativistic Bit Commitment.Physical Review Letters115December 2015HALDOI
- 5 articleSparse Permutations with Low Differential Uniformity.Finite Fields and Their Applications28March 2014, 214-243HALDOI
- 6 inproceedingsWave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes.ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security11921LNCSKobe, JapanSpringerDecember 2019, 21-51HALDOI
- 7 inproceedingsConstant overhead quantum fault-tolerance with quantum expander codes.FOCS 2018 - 59th Annual IEEE Symposium on Foundations of Computer ScienceParis, FranceOctober 2018, 743-754HALDOI
- 8 inproceedingsNew results on Gimli: full-permutation distinguishers and improved collisions.Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information SecurityDaejeon / Virtual, South KoreaDecember 2020HAL
- 9 inproceedingsBreaking Symmetric Cryptosystems Using Quantum Period Finding.Crypto 2016 - 36th Annual International Cryptology Conference9815LNCS - Lecture Notes in Computer ScienceSanta Barbara, United StatesSpringerAugust 2016, 207-237HALDOI
- 10 inproceedingsSHA-1 is a Shambles.USENIX 2020 - 29th USENIX Security SymposiumBoston / Virtual, United StatesAugust 2020HAL
- 11 articleSecurity of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.Physical Review Letters11820May 2017, 1--24HALDOI
- 12 inproceedingsMDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes.IEEE International Symposium on Information Theory - ISIT 2013Istanbul, TurkeyJuly 2013, 2069-2073HAL
- 13 articlePartitions in the S-Box of Streebog and Kuznyechik.IACR Transactions on Symmetric Cryptology20191March 2019, 302-329HALDOI
11.2 Publications of the year
International journals
- 14 articlePolynomial time key-recovery attack on high rate random alternant codes.IEEE Transactions on Information Theory706June 2024, 4492-4511HALDOIback to text
- 15 articleFast AES-Based Universal Hash Functions and MACs: Featuring LeMac and PetitMac.IACR Transactions on Symmetric Cryptology20242June 2024, 35-67HALDOI
- 16 articleBlock Cipher Doubling for a Post-Quantum World.IACR Communications in Cryptology1-34October 2024HALDOI
- 17 articleOn Impossible Boomerang Attacks: Application to Simon and SKINNYee.IACR Transactions on Symmetric Cryptology20242June 2024, 222-253HALDOI
- 18 articleCovert Communication Over Additive-Noise Channels.IEEE Transactions on Information TheoryDecember 2024HALDOI
- 19 articleNew Solutions to Delsarte’s Dual Linear Programs.IEEE Transactions on Information Theory711January 2025, 297-316HALDOI
- 20 articleOn the (In)security of optimized Stern-like signature schemes.Designs, Codes and Cryptography923March 2024, 803-832HALDOI
- 21 articleFast erasure decoder for hypergraph product codes.Quantum8August 2024, 1450HALDOI
- 22 articleQuantum Reduction of Finding Short Code Vectors to the Decoding Problem.IEEE Transactions on Information Theory707July 2024, 5323-5342HALDOI
- 23 articleQuantum Error-Correcting Codes with a Covariant Encoding.Physical Review Letters13324December 2024, 240603HALDOI
- 24 articleDesign of a Linear Layer Optimised for Bitsliced 32-bit Implementation.IACR Transactions on Symmetric Cryptology20241March 2024, 441-458HALDOI
- 25 articleNew Representations of the AES Key Schedule.Journal of Cryptology381November 2024, 2HALDOI
- 26 articleRobust sparse IQP sampling in constant depth.Quantum8May 2024, 1337HALDOI
- 27 articleShaped Constellation Continuous Variable Quantum Key Distribution: Concepts, Methods and Experimental Validation.Journal of Lightwave Technology4215August 2024, 5182-5189HALDOI
- 28 articleLDPC-cat codes for low-overhead quantum computing in 2D.Nature Communications161January 2025, 1040HALDOI
Invited conferences
International peer-reviewed conferences
- 31 inproceedingsThe Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.Lecture Notes in Computer ScienceAdvances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology ConferenceAdvances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part IVSanta Barbara (CA), United StatesSpringerAugust 2024, 139-173HALDOI
-
32
inproceedingsOn Functions of
mapping Cosets of to Cosets of .WCC 2024 ProceedingsWCC 2024 - Thirteenth International Workshop on Coding and CryptographyPerugia, ItalyJune 2024, 13HAL - 33 inproceedingsCryptanalysis of Algebraic Verifiable Delay Functions.Advances in Cryptology – CRYPTO 2024CRYPTO 2024 - 44th Annual International Cryptology Conference14922Lecture Notes in Computer ScienceSanta Barbara (CA), United StatesSpringer Nature SwitzerlandAugust 2024, 457-490HALDOI
- 34 inproceedingsImproving Generic Attacks Using Exceptional Functions.LNCSCRYPTO 2024 - 44th Annual International Cryptology Conference14923Santa Barbara, United StatesSpringer2024, 105-138HALDOI
- 35 inproceedingsA Generic Algorithm for Efficient Key Recovery in Differential Attacks – and its Associated Tool.EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich, SwitzerlandSpringer Nature SwitzerlandApril 2024, 217-248HALDOI
- 36 inproceedingsProjective Space Stern Decoding and Application to SDitH.AAC 2024 - Workshop on Advances in Asymmetric Cryptanalysis14587Lecture Notes in Computer ScienceAbu Dabi, United Arab EmiratesSpringer Nature Switzerland2024, 29-52HALDOI
- 37 inproceedingsThe Quantum Decoding Problem.Leibniz International Proceedings in Informatics (LIPIcs)Theory of Quantum Computation, Communication and Cryptography (TQC 2024)3106Okinawa, JapanSchloss Dagstuhl – Leibniz-Zentrum für InformatikAugust 2024, 14HALDOI
- 38 inproceedingsPartial Sums Meet FFT: Improved Attack on 6-Round AES.Eurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich, SwitzerlandSpringer Nature SwitzerlandApril 2024, 128-157HALDOI
- 39 inproceedingsUnderstanding the new distinguisher of alternant codes at degree 2.WCC 2024 : Thirteenth International Workshop on Coding and CryptographyPerugia, ItalyJune 2024HAL
Conferences without proceedings
- 40 inproceedingsOn the Properties of the Ortho-Derivatives of Quadratic Functions.WCC 2024 - The Thirteenth International Workshop on Coding and CryptographyPerugia, ItalyJune 2024HAL
- 41 inproceedingsRobust sparse IQP sampling in constant depth.QIP2024Taipei, TaiwanMay 2024, 1337HALDOI
- 42 inproceedingsBIKE Decoding Failure, Weak Keys & Error Floors.NIST Post-Quantum Cryptography SeminarGaithersburg, United StatesSeptember 2024HAL
Doctoral dissertations and habilitation theses
- 43 thesisAnalysis of AES-based and arithmetization-oriented symmetric cryptography primitives.Sorbonne UniversitéJune 2024HAL
- 44 thesisAlgebraic properties of symmetric ciphers and of their non-linear components.Sorbonne UniversitéDecember 2024HAL
- 45 thesisBIKE implementation : vulnerabilities and countermeasures.Sorbonne UniversitéJanuary 2024HAL
- 46 thesisQuantum key distribution and quantum error correction with bosonic systems.Sorbonne UniversitéApril 2024HAL
- 47 thesisSymmetric Cryptanalysis Beyond Primitives.Sorbonne UniversitéJanuary 2024HALback to text
- 48 thesisConception et analyse de chiffrements par blocs.Université Paris CitéFebruary 2024HAL
Reports & preprints
Other scientific publications
Educational activities
- 54 unpublishedLightweight symmetric primitives.October 2024, MasterItalyHAL
11.3 Cited publications
- 55 miscClassic McEliece: conservative code-based cryptography.Round 4 submission to the NIST call for postquantum cryptographic primitivesOctober 2022HALback to text
- 56 inproceedingsAn Algebraic Attack on Rank Metric Code-Based Cryptosystems.EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques12107Lecture Notes in Computer ScienceZagreb / Virtual, CroatiaSpringerMay 2020, 64--93HALDOIback to text
- 57 inproceedingsImprovements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security12491Lecture Notes in Computer ScienceDaejeon / Virtual, South KoreaSpringerDecember 2020, 507--536HALDOIback to text
- 58 articleOn the security of subspace subcodes of Reed-Solomon codes for public key encryption.IEEE Transactions on Information Theory681October 2021, 632-648HALDOIback to text
- 59 inproceedingsA new approach based on quadratic forms to attack the McEliece cryptosystem.Advances in Cryptology - ASIACRYPT 202314441Lecture Notes in Computer Science68 pages (Long version)Guo, J. and Steinfeld, R.Guangzhou, ChinaSpringer Nature SingaporeDecember 2023, 3-38HALDOIback to textback to text
- 60 articleOn the dimension and structure of the square of the dual of a Goppa code.Designs, Codes and Cryptography914November 2022, 1351--1372HALDOIback to text