Date: Wednesday 21 September 2016, 1pm – 5pm (Capture the Flag: 9am – 1pm)
Venue: Craiglockhart Campus, Edinburgh
Cost: Free event
In collaboration with BCS Edinburgh and Taylor & Francis, this conference will discuss some of the major issues involved in encryption, including with the usage of high performance computing to crack cryptography, and in law enforcement and industry challenges [Register for Conference].
A Capture The Flag (CTF) challenge will run from 9am to 1pm, with awards for the best teams being presented at the conference. The challenge will include problems of varied difficulty, where both beginners and seasoned information security experts will find something to enjoy [Register for CTF].
Key papers will be published within the Journal of Cyber Security Technology.
The following provides an outline of the programme:
|Time||1st Floor Younger Suite, Clusters 2/16A&B|
|9am-1pm||Crypto Cracking Capture The Flag, Charley Celice and Peter Aaby.
Make a day of it and take part in a Capture the Flag (CTF) competition from 9am. The competition will include challenges of varied difficulty, where both beginners and seasoned information security experts will find something to enjoy. Laptops will be provided, so you do not need to bring anything but yourself or your team. The competition will run from 9am to 1pm with awards for the best performance being presented at the conference.
|12.30-1.15pm||Conference Registration, Networking and Refreshments: Foyer
|1.15pm||Lindsay Stewart Lecture Theatre|
|1.15-2.15pm||Quantum Computing and Impact On Public Key Encryption, Prof Alan Woodward (Keynote).
In this talk we will take a rapid look at how conventional computing has developed in it’s power and the limitations that we are rapidly approaching. One answer to the limitations of silicon based conventional computing is the development of quantum computers. We will introduce the basic quantum physical principles behind quantum computers, and talk about some of the candidate technologies that are competing for the crown. We will give a gentle introduction to a specific quantum algorithm (Shor’s algorithm) and explain why it has some profound implications for the current, most popular encryption schemes that we all rely upon daily.
|2.15-2:45pm||Quantum Cloud Computing, Prof Elham Kashefi, University of Edinburgh
In this presentation, Prof Kashefi will present an introduction to key issues in quantum computing that would affect cyber security markets and key applications underway as part of UK national quantum technology program. She will explore issues such as ‘blind’ computation, hybrid classical/quantum computing, quantum simulation and the verification of quantum computers.
|2:45 – 3.15pm||Refreshments: Foyer
||Lindsay Stewart Lecture Theatre
|3.15-3:45pm||Differential Privacy and Quantum Robust Crypto, Prof Bill Buchanan, Edinburgh Napier University.
This will include a practical demonstration on how high performance computers and quantum computers can be setup to crack methods such as for RSA, and provides a demonstration of new quantum robust methods. There will be full demonstrations and a simplified overview of the new cryptography methods which would be relevant to protect cryptography from cracking within high performance environments, including to be resistant against cracking from quantum computers.
|3.45 – 4pm||CTF Awards Presented by John Murdoch, IBM|
|4:00 -5:00pm||Practical side-channel attacks on embedded device cryptography, Doug Carson, Dr Owen Lo, and Charley Celice (Endnote)
This presentation outlines the methods of monitoring devices for their electrical power drain and radio emissions, in order to determine both the classifications of the encryption method and the encryption key. It will provide practical demonstration of cracking cryptography from monitoring things like the electrical power drain, the radio wave emission, and from monitoring input/output ports, such as from the audio port.
Partners and Supporters
The conference is in collaboration with BCS Edinburgh and Taylor & Francis.
Additional sponsorship is provided by Farrpoint, with the CTF prize provided by IBM.
The Conference will be live streamed.
If you want to book a ticket, you can do it here:
If you want to pre-register yourself (or team) for the Crypto CTF, you can do it here: