Innovating Works
HORIZON-CL3-2022-CS-01-03
HORIZON-CL3-2022-CS-01-03: Transition towards Quantum-Resistant Cryptography
Sólo fondo perdido 0 €
Comunidad autónoma
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 16-11-2022.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Measuring, assessing and standardizing/certifying future-proof cryptographyAddressing gaps between the theoretical possibilities offered by quantum resistant cryptography and its practical implementationsQuantum resistant cryptographic primitives and protocols encompassed in security solutionsSolutions and methods that could be used to migrate from current cryptography towards future-proof cryptographyPreparedness for secure information exchange and processing in the advent of large-scale quantum attacks The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:During the next decades the European Union should seize the opportunities that quantum technologies will bring. However, quantum technologies will also pose a significant risk to the security of our society. The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization an... ver más

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Measuring, assessing and standardizing/certifying future-proof cryptographyAddressing gaps between the theoretical possibilities offered by quantum resistant cryptography and its practical implementationsQuantum resistant cryptographic primitives and protocols encompassed in security solutionsSolutions and methods that could be used to migrate from current cryptography towards future-proof cryptographyPreparedness for secure information exchange and processing in the advent of large-scale quantum attacks The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:During the next decades the European Union should seize the opportunities that quantum technologies will bring. However, quantum technologies will also pose a significant risk to the security of our society. The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded -including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future is a few decades away. There is a need to advance in the transition to quantum-resistant cryptography.

Applicants should propose approaches to tackle the abovementioned challenges, with the goal to develop cryptographic systems that are secure against attacks using both quantum or/and classical computers. Proposals may also try to better understand the expected capabilities of quantum computers (e.g. novel relevant quantum algorithms) and to further assess their implications to cybersecurity.

The proposed actions responding to this topic should take stock of and build on the relevant outcomes from other research fields (such as mathematics, physics, electrical engineering) and actions (e.g. H2020 projects, NIST Post-Quantum Cryptography competition, efforts in ETSI), and are encouraged to plan engaging and cooperating with them to the extent possible. Participation of SMEs is encouraged.

Applicants should demonstrate innovative ways to design, build, and deploy the new quantum-resistant infrastructures (including relevant hardware, software and IT processes). This should include switching from nowadays infrastructures to the proposed new ones with practical migration paths, aiming to efficiently manage the total time needed and the total costs associated, while also paying attention to affordable energy consumption.

Applicants should look at the implementation of quantum-resistant algorithms on software as well as specific hardware, such as. resource constrained IoT devices, smart cards, high-speed field-programmable gate arrays.

Proposals should devise, develop and validate metrics, methodologies, conformity assessment tests and tools for assessing and quantifying the security and the privacy of the proposed systems and services. Furthermore, proposals should strive to encompass a thorough comprehensive security evaluation of the engineering and deploying of efficient and secure implementations of the proposed solutions. Due consideration should be given to countermeasures against side channel attacks.

Applicants should strive to use the most promising relevant cryptographic primitives as well as to adapt the used cryptographic protocols accordingly.

Proposals may analyse how to develop combined quantum-classical[1] cryptographic solutions in Europe, for those use cases where these hybrid solutions might bring gains to the overall security. To this end, the analysis should take into account relevant actions in quantum cryptography (e.g. H2020 OpenQKD project, EuroQCI).

Proposals should validate their concept by exercising and deploying pilot demonstrators in relevant use cases. The demonstrators should include exercises on executing different migration strategies for real use cases and applications that would allow their implementation in large-scale, complex systems. Lessons learned from the exercises should be transformed into practical, multidisciplinary guidelines that support entities to plan and execute their own migration, considering the technical, the economical and legal contexts.

For expanding the proposed work in terms of including additional quantum-resistant infrastructures, additional pilot sites, additional countries and users the actions may involve financial support to third parties in line with the conditions set out in Part B of the General Annexes. Each consortium will define the selection process of the third parties for which financial support will be granted (typically in the order of EUR 50 000 to 300 000 per party). Up to 20% of the EU funding requested by the proposal may be allocated to the purpose of financial support to third parties.

In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 6 by the end of the project – see General Annex B.




Cross-cutting Priorities:Digital AgendaArtificial Intelligence


<p id=fn1>[1]Here “classical” is used with the meaning of non-quantum. Hence “post-quantum cryptography” is considered as advanced classical cryptography.

ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Comunidad autónoma :
Solo pueden aplicar a esta linea las empresas con sede en:
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración: ¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Subcontracting costs.
Purchase costs.
Other cost categories.
Indirect costs.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 6:. Representa un paso importante en demostrar la madurez de una tecnología. Se construye un prototipo de alta fidelidad que aborda adecuadamente las cuestiones críticas de escala, que opera en un entorno relevante, y que debe ser a su vez una buena representación del entorno operativo real. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar desde un 70% hasta un 100%.
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities. The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Increased cybersecurity 2022 ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Sin info.
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Development and validation of processes and tools used for agile certification of ICT products, ICT services and ICT processes
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following outcomes: Availability of applicable tools and proce...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-02 Trustworthy methodologies, tools and data security “by design” for dynamic testing of potentially vulnerable, insecure hardware and software components
en consorcio: ExpectedOutcome:Projects are expected to contribute to some of the following expected outcomes: Effective access control to system componen...
Cerrada hace 2 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada hace 54 años | Próxima convocatoria prevista para el mes de