<?xml version="1.0"?>
<News hasArchived="true" page="1" pageCount="1" pageSize="10" timestamp="Sat, 18 Apr 2026 19:19:32 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=quantum-computing">
<NewsItem contentIssues="true" id="129855" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129855">
<Title>talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols<h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h1><strong>Designing Quantum Resistant Key<br>Exchange Protocols with CPSA</strong></h1><h2><strong>Dr. Edward Zieglar, CSEE, UMBC</strong></h2><h3><strong>12–1 pm, Friday, 15 April 2022</strong><br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>With developments in quantum computers and algorithms, the public-key systems that we rely upon for secure network communication will become vulnerable to exploitation. Quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols. Much of the work has focused on developing new mathematical problems that are conjectured to be quantum-resistant as replacements for our current public-key algorithms. We took a different approach, looking to an old secret-key agreement protocol developed by Leighton and Micali at MIT for the <a href="https://en.wikipedia.org/wiki/Clipper_chip" rel="nofollow external" class="bo">Clipper Chip</a> symmetric encryption system. We will present our analysis of the Leighton-Micali key agreement protocol, weaknesses we uncovered with the Cryptographic Protocol Shapes Analyzer (CPSA), and verification of a new protocol based on their ideas that corrects deficiencies in the original protocol.</p><p>Dr. Zieglar is an expert in protocol analysis and computer security at the National Security Agency. He is an adjunct faculty member at UMBC and a member of the UMBC Protocol Analysis Lab. Dr. Zieglar earned his Ph.D. in computer science from UMBC working under Dr. Sidhu. Email: <a href="mailto:eziegl1@umbc.edu">eziegl1@umbc.edu</a></p><p>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 29, Ian Blumenfeld (UMBC), May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/" rel="nofollow external" class="bo">talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129855/guest@my.umbc.edu/74b27f1cfa2abf4a1e3e49e7f47ece4e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>quantum-computing</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 11 Apr 2022 15:30:28 -0400</PostedAt>
<EditAt>Mon, 11 Apr 2022 15:30:28 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118396" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118396">
<Title>talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/quantum-crypto-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols<h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h1><strong>Designing Quantum Resistant Key<br>Exchange Protocols with CPSA</strong></h1><h2><strong>Dr. Edward Zieglar, CSEE, UMBC</strong></h2><h3><strong>12–1 pm, Friday, 15 April 2022</strong><br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>With developments in quantum computers and algorithms, the public-key systems that we rely upon for secure network communication will become vulnerable to exploitation. Quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols. Much of the work has focused on developing new mathematical problems that are conjectured to be quantum-resistant as replacements for our current public-key algorithms. We took a different approach, looking to an old secret-key agreement protocol developed by Leighton and Micali at MIT for the <a href="https://en.wikipedia.org/wiki/Clipper_chip" rel="nofollow external" class="bo">Clipper Chip</a> symmetric encryption system. We will present our analysis of the Leighton-Micali key agreement protocol, weaknesses we uncovered with the Cryptographic Protocol Shapes Analyzer (CPSA), and verification of a new protocol based on their ideas that corrects deficiencies in the original protocol.</p><p>Dr. Zieglar is an expert in protocol analysis and computer security at the National Security Agency. He is an adjunct faculty member at UMBC and a member of the UMBC Protocol Analysis Lab. Dr. Zieglar earned his Ph.D. in computer science from UMBC working under Dr. Sidhu. Email: *protected email*</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: April 29, Ian Blumenfeld (UMBC), May 13, Enka Blanchard (Digitrust Loria, France).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/" rel="nofollow external" class="bo">talk: Designing Quantum Resistant KeyExchange Protocols with CPSA, 12-1 Fri 4/15, online</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/talk-designing-quantum-resistant-keyexchange-protocols-with-cpsa-12-1-fri-4-15-online/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118396/guest@my.umbc.edu/9d16aa9a4995c46bfa5cf72d425c0ffb/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>quantum-computing</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 11 Apr 2022 15:30:28 -0400</PostedAt>
<EditAt>Mon, 11 Apr 2022 15:30:28 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96902" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96902">
<Title>talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/katz-1024x511.png" alt="" style="max-width: 100%; height: auto;"><hr><h5><strong>UMBC Cyber Defense Lab presents</strong></h5><hr><h2><strong>Secure Computation: From Theory to Practice</strong></h2><h3><strong>Jonathan Katz</strong></h3><h3><strong>Computer Science Department<br>University of Maryland, College Park</strong></h3><h3><strong>12:00–1:00 pm EDT, Friday, 30 October 2020</strong><br>Online via <a href="https:://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">Webex</a> </h3><hr><p>Protocols for secure multi-party computation (<a href="https://en.wikipedia.org/wiki/Secure_multi-party_computation" rel="nofollow external" class="bo">MPC</a>) allow a collection of mutually distrusting parties to compute a function of their private inputs without revealing anything else about their inputs to each other. Secure computation was shown to be feasible 35 years ago, but only in the past decade has its efficiency been improved to the point where it has been implemented and, more recently, begun to be used. This real-world deployment of secure computation suggests new applications and raises new questions.</p><p>This talk will survey some recent work at the intersection of the theory and practice of MPC, focusing on a surprising application to the construction of <a href="https://microsoft.github.io/Picnic/" rel="nofollow external" class="bo">Picnic</a>, a “post-quantum” signature scheme currently under consideration by NIST for standardization.</p><p><a href="https://www.cs.umd.edu/~jkatz/" rel="nofollow external" class="bo">Jonathan Katz</a> is a faculty member in the department of computer science at the University of Maryland, College Park, where he formerly served as director of the Maryland Cybersecurity Center for over five years. He is an IACR Fellow, was named a University of Maryland distinguished scholar-teacher in 2017-2018, and received the ACM SIGSAC Outstanding Contribution Award in 2019.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</p><p>Upcoming CDL Meetings: Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/" rel="nofollow external" class="bo">talk: Secure Computation: From Theory to Practice, 12-1pm Oct 30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Secure Computation: From Theory to Practice  Jonathan Katz  Computer Science Department University of Maryland, College Park  12:00–1:00 pm EDT, Friday, 30...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-secure-computation-from-theory-to-practice-12-1pm-oct-30/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96902/guest@my.umbc.edu/d095dd467d54d3508b78e08059ead114/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>quantum-computing</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 24 Oct 2020 13:33:48 -0400</PostedAt>
<EditAt>Sat, 10 Oct 2020 13:33:00 -0400</EditAt>
</NewsItem>

</News>
