{"guid":"e0bdcf07-e247-578a-969d-41d463743566","title":"Kyber and Post-Quantum Crypto","subtitle":"How does it work?","slug":"rc3-2021-cwtv-230-kyber-and-post-quantum","link":"https://pretalx.c3voc.de/rc3-2021-cwtv/talk/UGZY8B/","description":"Post-quantum crypto is being rolled out to secure **you** from quantum computers! Unfortunately, few people know how post-quantum works. Let's change that!\r\nIn this zero-to-hero talk we'll dive into the inner workings of Kyber, a prominent member of the post-quantum family.\r\n\r\nPost-Quantum Crypto is the art of inventing asymmetric cryptography that can withstand large quantum computers. This relatively young subject becomes more and more relevant as [Shor’s algorithm](https://en.wikipedia.org/wiki/Shor%27s_algorithm) would break all of today’s asymmetric cryptography once a large enough quantum computer can be build.\r\nTherefore RSA, Elliptic Curve Crypto, Diffie-Hellman, DSA and friends could soon be obsolete.\r\n \r\nKyber (formerly known as New Hope) is among the first post-quantum schemes to be standardized and already found its way into products. As a lattice-based system, Kyber is fast and its security guarantees are linked to an NP-hard problem. Also, it has all the nice mathematical ingredients to confuse the hell out of you: vectors of odd-looking polynomials, algebraic rings, error terms and a security reduction to “module lattices”.\r\n \r\nThis talk will introduce you to the world of post-quantum cryptography by giving a hands-on tutorial on how its most prominent member - Kyber - works. We'll start with high school level mathematics and work our way up to constructing Kyber. By constructing such a toy-sized Kyber, we can learn how the system works, comprehend its design decisions and see how it is related to an NP-hard problem.\r\nAfter that we’ll take a brief look into how PQC will change real world cryptography in the near future.","original_language":"eng","persons":["Ruben Gonzalez","Krijn Reijnders"],"tags":["rc3-2021","230","2021","Auf in die Zukunft!"],"view_count":7139,"promoted":false,"date":"2021-12-28T17:00:00.000+01:00","release_date":"2021-12-28T00:00:00.000+01:00","updated_at":"2026-04-15T12:45:07.188+02:00","length":3760,"duration":3760,"thumb_url":"https://static.media.ccc.de/media/events/rc3/2021/230-e0bdcf07-e247-578a-969d-41d463743566.jpg","poster_url":"https://static.media.ccc.de/media/events/rc3/2021/230-e0bdcf07-e247-578a-969d-41d463743566_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/rc3/2021/230-e0bdcf07-e247-578a-969d-41d463743566.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/rc3/2021/230-e0bdcf07-e247-578a-969d-41d463743566.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/rc3-2021-cwtv-230-kyber-and-post-quantum","url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_title":"rC3 NOWHERE","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"fin","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.fi.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2023-09-02T02:29:09.195+02:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.fi.srt","url":"https://api.media.ccc.de/public/recordings/69669","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-28T09:08:13.806+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.en.srt","url":"https://api.media.ccc.de/public/recordings/56049","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":430,"length":3760,"mime_type":"video/webm","language":"eng-deu","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-12-28T21:31:50.328+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/webm-hd/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/56061","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":215,"length":3760,"mime_type":"video/webm","language":"eng-deu","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-12-28T20:29:11.028+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/webm-sd/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/56048","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":183,"length":3760,"mime_type":"video/mp4","language":"eng-deu","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-12-28T19:46:32.027+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/h264-sd/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_sd.mp4","url":"https://api.media.ccc.de/public/recordings/56040","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":36,"length":3760,"mime_type":"audio/opus","language":"eng","filename":"rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2021-12-28T19:44:35.222+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/opus/rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_opus.opus","url":"https://api.media.ccc.de/public/recordings/56038","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":57,"length":3760,"mime_type":"audio/mpeg","language":"eng","filename":"rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2021-12-28T19:43:16.961+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/mp3/rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/56037","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":405,"length":3760,"mime_type":"video/mp4","language":"eng-deu","filename":"rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-12-28T19:37:56.663+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/h264-hd/rc3-2021-import-230-eng-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work_hd.mp4","url":"https://api.media.ccc.de/public/recordings/56027","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":346,"length":3760,"mime_type":"video/mp4","language":"deu","filename":"rc3-2021-import-230-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-12-28T19:37:40.840+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/h264-hd/rc3-2021-import-230-deu-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.mp4","url":"https://api.media.ccc.de/public/recordings/56026","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"},{"size":346,"length":3760,"mime_type":"video/mp4","language":"eng","filename":"rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-12-28T19:37:25.887+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2021/h264-hd/rc3-2021-import-230-eng-Kyber_and_Post-Quantum_Crypto_-_How_does_it_work.mp4","url":"https://api.media.ccc.de/public/recordings/56025","event_url":"https://api.media.ccc.de/public/events/e0bdcf07-e247-578a-969d-41d463743566","conference_url":"https://api.media.ccc.de/public/conferences/rc3-2021"}]}