IBM at Eurocrypt 2026

About

IBM is proud to sponsor EUROCRYPT 2026, a premier international conference on cryptology. It brings together researchers and practitioners to present and discuss the latest advances in cryptographic theory and applications.

We look forward to meeting you at the event and telling you more about our latest work at IBM Research.

Please refer to the agenda below to find out about our featured work.


Agenda

  • Description:

    The migration to post-quantum cryptography (PQC) and increasing regulatory requirements such as the EU Cyber Resilience Act and DORA, increase the demand for comprehensive visibility into cryptographic assets across software systems. A Cryptography Bill of Materials (CBOM) provides a standardized inventory of cryptographic algorithms, protocols, certificates, and related material used within software components and services. This paper presents the anatomy of CBOMs as standardized in OWASP CycloneDX (ECMA-424), examining the object model for cryptographic assets, dependency relationships, and evidence capture. We analyze how CBOMs integrate with the broader xBOM ecosystem, including Software (SBOM), Operations (OBOM), Hardware (HBOM), and SaaS BOMs, to provide full-stack cryptographic transparency. Through practical use cases, we demonstrate how CBOMs enable policy-based compliance evaluation, support hybrid PQC migration strategies, and facilitate cryptographic agility. We discuss challenges in CBOM generation including naming ambiguities, configuration-driven cryptography, and the distinction between provision of cryptography and consumption. Finally, we outline evolution toward future CBOM revisions.

    Authors:
    BH
    Basil Hess
    Senior Research Engineer, Cryptography
  • Description:

    The impending post-quantum cryptographic transition requires replacing algorithms across entire software portfolios, yet no systematic method exists for decomposing cryptographic agility into assessable dimensions. The term conflates distinct capabilities, including algorithm replacement, policy-driven selection, and implementation substitution, and the absence of a structured decomposition impedes both assessment and principled API design. We make four contributions. First, we introduce a component-based assessment framework that characterizes application-level cryptographic agility along seven orthogonal dimensions, capturing non-hierarchical profiles that linear maturity models cannot represent. Second, we derive thirteen API design principles from five foundational architectural properties. Third, we demonstrate their realization through concrete Protocol Buffers API patterns. Fourth, we evaluate six representative systems (PKCS#11, OpenSSL~3.0, JCA, Google Tink, AWS KMS, and HashiCorp Vault Transit), revealing three pervasive gaps: most achieve only partial operation decoupling (uniform signatures, but algorithm-specific parameters still leak through) and none reaches intent-based key creation, making algorithm migration a per-site code-change problem; none provides policy-driven algorithm selection, so organizations govern who may use cryptography but not which algorithms; and most lack the ability to transform existing keys to new algorithms. These gaps are independent and individually sufficient to prevent agile migration, explaining why post-quantum transition remains a code-change problem despite decades of API progress.

    Authors:
    GM
    Gregoire Messmer
    IBM

More events