Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 16: Emerging Technologies in Cybersecurity Course (How To)

via Treehouse

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it

About this Course

In this chapter, emerging post-quantum cryptographic (PQC) technologies are explored with a focus on lattice and code-based schemes, detailing how Physical Unclonable Functions (PUFs) can be integrated to generate secure public–private key pairs for future PKIs. Experimental evaluations demonstrate that, with proper optimization (e.g., using AVX2 and GPU acceleration), PQC protocols like CRYSTALS-Dilithium and LightSABER can achieve performance competitive with current ECC-based systems, paving the way for secure key distribution in the quantum era.

Syllabus

16.2. Lattice and Code-Based Post Quantum Cryptography

In this stage, the chapter introduces the foundational PQC schemes based on lattice problems and code-based approaches, explaining key generation methods like Learning with Error (LWE), Learning with Rounding (LWR), and NTRU cryptography.

Chevron 5 steps
  • instruction

    16.1. Introduction

  • instruction

    16.2.1 Learning with Error Cryptography

  • instruction

    16.2.2 Learning with Rounding Cryptography

  • instruction

    16.2.3 NTRU Cryptography

  • Quiz 16.2

    5 questions

16.3. Public Key Infrastructure

In this stage, the integration of PQC algorithms into a traditional Public Key Infrastructure is discussed, emphasizing the secure generation, distribution, and verification of key pairs using advanced cryptographic techniques and hardware acceleration.

Chevron 4 steps
  • instruction

    16.3.1 Public-Private Key Pairs

  • instruction

    16.3.2 PKI with Network of PUFs

  • instruction

    16.3.3 Implementation of PQC Algorithms for PKI

  • Quiz 16.3

    5 questions

16.4. PUF-Based Key Distribution for PQC

In this stage, protocols leveraging Physical Unclonable Functions (PUFs) are presented to generate one-time-use key pairs for various PQC algorithms, ensuring enhanced security by mitigating storage risks and addressing error rates with error-correcting techniques.

Chevron 6 steps
  • instruction

    16.4.1 PUF-Based Key Distribution for LWE Lattice Cryptography

  • instruction

    16.4.2 PKI Architecture with PUF-Based Key Distribution and LWE

  • instruction

    16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography

  • instruction

    16.4.4 PUF-Based Key Distribution for NTRU Lattice Cryptography

  • instruction

    16.4.5 PUF-Based Key Distribution for Code-Based Cryptography

  • Quiz 16.4

    5 questions

16.5. Experimental Evaluation

In this stage, the chapter details the experimental setup and results, comparing key generation throughput across different PQC algorithms using a response-based cryptography (RBC) engine and benchmarking them against established standards like ECC and AES.

Chevron 4 steps
  • instruction

    16.5 Introduction

  • instruction

    16.5.1 Experimental Methodology

  • instruction

    16.5.2 Evaluation of the Effective Key Throughput

  • Quiz 16.5

    5 questions

Reviews

Start your review of (UPI) Chapter 16: Emerging Technologies in Cybersecurity Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.