Dagstuhl Seminar 09031
Symmetric Cryptography
( Jan 11 – Jan 16, 2009 )
Permalink
Organizers
- Helena Handschuh (San Francisco, US)
- Stefan Lucks (Bauhaus-Universität Weimar, DE)
- Bart Preneel (KU Leuven, BE)
- Phillip Rogaway (University of California - Davis, US)
Contact
- Annette Beyer (for administrative matters)
Cryptography is the science that studies secure communication in adversarial environments. Symmetric Cryptography deals with two cases:
- either sender and receiver share the same secret key, as for encryption and message authentication;
- or neither sender nor receiver use any key at all, as, e.g., in the case of cryptographic hash functions.
Specifically, Symmetric Cryptography deals with symmetric primitives (block and stream ciphers, message authentication codes and hash functions), and complex cryptosystems and cryptographic protocols employing these primitives.
Since symmetric cryptosystems are one to two orders of magnitude more efficient than asymmetric systems, most security applications use symmetric cryptography to ensure the privacy, the authenticity and the integrity of sensitive data. Even most applications of public-key cryptography are actually working in a hybrid way, separating an asymmetric protocol layer for key transmission or key agreement from secure payload transmission by symmetric techniques.
The seminar brought together about 40 researchers from industry and academia, leading experts as well as exceptionally talented junior researchers. Most of the presentations did concentrate on one of the following three research directions:
- studying the design and analysis of stream ciphers
- presenting and attacking recent proposals for cryptographic hash functions; and
- advancing the field of complex symmetric cryptosystems and protocols and their provable security.
Research in Symmetric Cryptography is quickly evolving. The seminar was the second of its kind, the first one took place in 2007. We observe a steadily increasing interest in Symmetric Cryptography, as well as a growing practical demand for symmetric algorithms and protocols.
The seminar was very successful in discussing recent results and sharing new ideas. Furthermore, it inspired the participants to consider how Symmetric Cryptography has evolved in the past, and how they would like it to evolve in the future. The hospitality and support of the Dagstuhl team did contribute significantly to the success of the seminar.
- Elena Andreeva (KU Leuven, BE) [dblp]
- Frederik Armknecht (Ruhr-Universität Bochum, DE) [dblp]
- Jean-Philippe Aumasson (FH Nordwestschweiz - Brugg, CH) [dblp]
- Daniel J. Bernstein (University of Illinois - Chicago, US) [dblp]
- Eli Biham (Technion - Haifa, IL) [dblp]
- Alex Biryukov (University of Luxembourg, LU) [dblp]
- Johannes A. Buchmann (TU Darmstadt, DE) [dblp]
- Joan Daemen (STMicroelectronics - Zaventem, BE) [dblp]
- Christophe De Cannière (KU Leuven, BE)
- Markus Dichtl (Siemens AG - München, DE)
- Thomas Dullien (zynamics GmbH - Bochum, DE) [dblp]
- Orr Dunkelman (ENS - Paris, FR) [dblp]
- Marc Fischlin (TU Darmstadt, DE) [dblp]
- Ewan Fleischmann (Bauhaus-Universität Weimar, DE)
- Christian Forler (Sirrix AG Bochum, DE) [dblp]
- Henri Gilbert (France Telecom - Issy Les Moulineaux, FR) [dblp]
- Michael Gorski (Bauhaus-Universität Weimar, DE)
- Helena Handschuh (San Francisco, US) [dblp]
- Jan Hühne (Bauhaus-Universität Weimar, DE)
- Sebastiaan Indesteege (KU Leuven, BE)
- Tetsu Iwata (Nagoya University, JP) [dblp]
- Antoine Joux (University of Versailles, FR) [dblp]
- Shahram Khazaei (EPFL - Lausanne, CH)
- Dmitry Khovratovich (University of Luxembourg, LU) [dblp]
- Matthias Krause (Universität Mannheim, DE) [dblp]
- Anja Lehmann (TU Darmstadt, DE) [dblp]
- Stefan Lucks (Bauhaus-Universität Weimar, DE) [dblp]
- Alexander May (Ruhr-Universität Bochum, DE) [dblp]
- Willi Meier (FH Nordwestschweiz - Windisch, CH) [dblp]
- Shiho Moriai (Sony Corporation - Tokyo, JP)
- Jorge Nakahara (EPFL - Lausanne, CH)
- Maria Naya-Plasencia (INRIA - Le Chesnay, FR) [dblp]
- Kaisa Nyberg (Helsinki University of Technology, FI) [dblp]
- Bart Preneel (KU Leuven, BE) [dblp]
- Christian Rechberger (TU Graz, AT) [dblp]
- Thomas Ristenpart (University of California - San Diego, US) [dblp]
- Andrea Röck (INRIA - Le Chesnay, FR)
- Phillip Rogaway (University of California - Davis, US) [dblp]
- Greg Rose (Qualcomm Inc. - San Diego, US) [dblp]
- Martin Schläffer (TU Graz, AT)
- Richard Schroeppel (Sandia National Labs - Albuquerque, US)
- Thomas Shrimpton (University of Lugano, CH) [dblp]
- Dirk Stegemann (Universität Mannheim, DE)
- John Steinberger (University of British Columbia, CA) [dblp]
- Gilles Van Assche (STMicroelectronics - Zaventem, BE) [dblp]
- Serge Vaudenay (EPFL - Lausanne, CH) [dblp]
- Ralf-Philipp Weinmann (University of Luxembourg, LU)
- Doug Whiting (Hi/fn Inc.- Carlsbad, US)
- Erik Zenner (Technical University of Denmark - Lyngby, DK)
Related Seminars
- Dagstuhl Seminar 07021: Symmetric Cryptography (2007-01-07 - 2007-01-12) (Details)
- Dagstuhl Seminar 12031: Symmetric Cryptography (2012-01-15 - 2012-01-20) (Details)
- Dagstuhl Seminar 14021: Symmetric Cryptography (2014-01-05 - 2014-01-10) (Details)
- Dagstuhl Seminar 16021: Symmetric Cryptography (2016-01-10 - 2016-01-15) (Details)
- Dagstuhl Seminar 18021: Symmetric Cryptography (2018-01-07 - 2018-01-12) (Details)
- Dagstuhl Seminar 20041: Symmetric Cryptography (2020-01-19 - 2020-01-24) (Details)
- Dagstuhl Seminar 22141: Symmetric Cryptography (2022-04-03 - 2022-04-08) (Details)
- Dagstuhl Seminar 24041: Symmetric Cryptography (2024-01-21 - 2024-01-26) (Details)
- Dagstuhl Seminar 26061: Symmetric Cryptography (2026-02-01 - 2026-02-06) (Details)
Classification
- Security
- Cryptography
Keywords
- Authenticity
- Integrity
- Privacy
- Stream Ciphers
- Hash Functions
- Provable Security
- Cryptanalysis