ࡱ> FHE bjbjLL 4*.bc.bc%IIIII]]]8](4"###><$`((((((($O*-<(Ittt<(II##Q(ffftI#I#(ft(ff&h '##F~&(g(0(&|-T- '-I 'ttfttttt<(<(fttt(tttt-ttttttttt : Name of Traveler(s): Lidong Chen, Dustin Moody, Andrew Regenscheid, and Yi-Kai Liu Division/OU: Computer Security Division and /ITL Countries and Institutions Visited: Toronto, Canada Travel Dates: September 18 22, 2016 Purpose of trip: To speech and serve panelists at 4th ETSI/IQC Workshop on Quantum-Safe Cryptography, and to meet with European Government Representatives to discuss strategies and technical issues on post-quantum cryptography. NIST International Goals Addressed (check all appropriate):  FORMCHECKBOX  Measurement and standards infrastructure that enables global market access for U.S. products  FORMCHECKBOX  Global leadership in measurement science as a foundation for emerging technologies  FORMCHECKBOX  Harmonized standards and transparent regulatory regimes  FORMCHECKBOX  Support for US Foreign Policy Objectives Important Contacts: Michele Mosca, co-founder and deputy director of Institute for Quantum Computing at the University of Waterloo Norbert Ltkenhaus, Institute for Quantum Computing (IQC), Waterloo Luis Jorge Romero, ETSI Director-General Manfred Lochter, the German Federal Office for Information Security (BSI) Colin Whorlow, Head of International Standards, CESG, UK Highlights/Summary: The 4th ETSI/IQC Workshop took place in Toronto, Canada, on 19 21 September 2016. It was introduced on 19 September by a special Executive Track and followed by an in depth technical workshop on 20-21 September 2016. At Executive Track, Andrew Regenscheid participated in Panel titled Public Sector Views On Quantum Computers and Threats to Governments. Andrew shared NIST view on preparing cyber security in Quantum Era and also introduced NIST effort in post quantum cryptography and quantum information research, collaboration with academic, and standardization initiatives. Also at Executive Track, Lidong Chen participated in Panel titled The Importance of Standardization The panel discuss some basic issues about future quantum cryptography standardization. Lidong Chen shared views on the importance of public securitization for the cryptographic tools to be standardized and the importance of crypto agility for future migration. At the first day technical program, Andrew Regenscheid gave a talk in the World Tour session focusing on the NIST recent effort on post-quantum cryptography standardization. At the first day technical session 2, Joint Global Efforts, Yi-Kai Liu presented a summary about the Qcrypto 2016 conference ended the previous week. Yi-Kai is the program chair of Qcrypto 2016. He summarized the major research results presented at Qcrypto and their impact. At the first day technical session 4, Lidong Chen and Dustin Moody gave a join talk titled Towards Post-Quantum Cryptography Standardization. The presentation discussed the main technical issues and challenges observed in developing draft requirements and evaluation criteria in NIST call for proposals. Compared with the previous ETSI Quantum-Safe Workshops, this workshop attracted more participants (179). At the workshop, the following are observed. Industry has initiated substantial effort. Microsoft, Cisco, and Intel shared their effort, view and plan. Different standards organizations have been engaged in developing post-quantum cryptography standards. In particular, ETSI, ISO/IEC JTC 1 SC27, Cloud Security Alliance, reported their standards progress. Many joint projects on post-quantum cryptography and quantum information such as EU project PQCrypto, Safecrypt, etc. are gathering expertise and making recommendations. Hybrid mode becomes more in favor as an interim migration solution. Some industry representatives clearly expressed that even hybrid mode will not help to improve performance, it provides opportunities to try on post-quantum cryptography primitives and to better understand the new tools. Japan, Korea, Canada, and China devoted tremendous resource on quantum key distribution (QKD). On the other hand, people still have different understandings about how to use QKD in the existing applications. The comment period for draft requirements and evaluation criteria just closed before the workshop. NIST travelers had opportunities to discuss with the participants and received many helpful suggestions. On September 22, Andrew Regenscheid, Dustin Moody, and Lidong Chen met with European government agencies, including BSI (Germany), ANSSI (France), CESG (UK), NSM (Norway), and NCSA (Sweden). At this meeting, each agency updated the progress in quantum related projects. The representatives also discussed confidence and developments for each of the families. It is a common understanding among the agencies that QKD cannot replace post-quantum cryptography and shall not be considered as a standalone solution. The agencies also verbally discussed their comments and suggestions on NIST call for proposals. Benefit to NIST: Developing cryptography standards which can resist quantum computing techniques is a high priority task for NIST cryptography team. NIST effort in post-quantum cryptography standardization has been the leading effort. The workshop is a great opportunity for NIST team to obtain feedback from international community. Key Technologies/words: All the key technologies/words are included in the above fields [These should be words that are not in any of the above fields that would help in a search. They could include Administrative Priorities, project names, industry sectors, technical areas of relevance, etc.] Follow-up actions for OU (if any): None     PAGE  PAGE 2  .0BRa{ G       v x y ' ) * 8 9 : < f g z | . / X h++ h++h++hh{j\h/nUjh/nUjh#JUjth#JU h*Vh/njh#JUjh#JU hehehhX?Pheh#Jh/n8S   x ) f g | / Y gdKV & Fgd/n & Fgd++ & Fgdegd 0^`0gdLQ|gd/nX Y h j =IVYZ:T`}~  W}}&<Vjkǿÿÿh+#h2h#hhA hM`hM` h"7gh"7gh"7gh/|Yh'hX?PhWf hX?PhX?Ph/h/n hKVhKVhKVh++h h++h++he> ;Wl4k8 7 dd[$\$gd/ngd/ngdM` & Fgd# & Fgd+# & Fgd"7g & FgdX?P & FgdX?P8  +3567GHÿٷٯh 0JmHnHuhLQ| hLQ|0JjhLQ|0JUh$jh$Uh,!h/Wh^(VhLr h`Ah/n h`Ah`AhWfh/nhM` hmh/nh0h5'h+#h:h2h7 dd[$\$gd/n &`#$gd/n 21h:p/n/ =!"#$% tDeCheck1tDeCheck2tDeCheck3tDeCheck4t2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@6_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA`D Default Paragraph FontRiR  Table Normal4 l4a (k (No List 4U 4 Ib Hyperlink >*ph4 @4 * Footer  !.)@. * Page NumberD"D @' Balloon TextCJOJQJaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VGRU1a$N% ʣꂣKЛjVkUDRKQj/dR*SxMPsʧJ5$4vq^WCʽ D{>̳`3REB=꽻Ut Qy@֐\.X7<:+& 0h @>nƭBVq1u`X=:tڣf{Xx {dV=|kPo۵(h[x )IеnW[@;0PDbRy( "IROnVxCD' bJZ65I[adH+^D )>s=h ۟~7zWo^=[Qr||[?|̦ o{O=4?}}L$Xx%@|Ư'11%i$P,c[GD7sH5. 4kIƉZKTPBM HN7|nB#L7^`!\29pCH3nMb#$.'19b%+vJ~.!DI;DPz l 2I ͚;|y3+~Dؕjw0e1vdǪzO^I57y+d8bnv 4?6CK\M#= ċ(0'1 zxpWc/_X4/A_[)^&(fp[_NiK7@wd5= I?>_q샏[ꚝΡdrv5CojFh>PG3mOs=͡|7n;:N&?\8Lټ@_<}9H}]Ru Vx~p{3AsP~\v!cZ 6JOw׃SB HfЖ gpj*4nR2BM} rfw[BfV= vͅh7/sɳ ̲B3뤓eH=J_:hn$O\ʧFn;/x.M#+d,W87+IwOťwF) uepwPϬ pV$2v Sv(C8L\~+l`k& Y iTU#p~XHYHeʹ,fͰ-;Y7XmM 9ͬYMm*/稺W(r2bUGڱ]]HYUcF8U~ۍZZnJmi}kn^l * $$$'X  x)9G G G G$  '!!8@0(  B S  ?Check1Check2Check3Check4y*:ah  P W x } 1 > F `j 5TO)w qp(dGva"~(&i|  ^`OJQJo( 8^8`OJQJo(^`OJQJ^Jo(o  p^ `OJQJo(  @ ^ `OJQJo( x^x`OJQJo(H^H`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.)w (&ip(Gva                  0{,Bha^2=vM8Ͳ1$tP9x/87:M3 ,!+#5'++,02S?wG#JuKX?P^(V4V!Ae/_W{KV/WM`@`ATm},#'/nm  &@IIII@UnknownG*Ax Times New Roman5Symbol3. *Cx ArialC  PLucida Grande?= *Cx Courier New;WingdingsA$BCambria Math"1hMI'Ig2ƦB 'B '!42QHP ?Ib2!xx ;[ ,Materials Science and Engineering LaboratorymcooleyChen, Lily (Fed)      Oh+'0 $0 P \ h t0Materials Science and Engineering LaboratorymcooleyNormalChen, Lily (Fed)3Microsoft Office Word@@:@:@B՜.+,0 hp  NIST'  -Materials Science and Engineering Laboratory Title  !"#$%&'()*+,-./012346789:;<>?@ABCDGRoot Entry F#IData 1Table-WordDocument4*SummaryInformation(5DocumentSummaryInformation8=CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q