Innovating Works
HORIZON-CL3-2022-CS-01-03
HORIZON-CL3-2022-CS-01-03: Transition towards Quantum-Resistant Cryptography
ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
Sólo fondo perdido 0 €
European
This call is closed This line is already closed so you can't apply. It closed last day 16-11-2022.
An upcoming call for this aid is expected, the exact start date of call is not yet clear.
Luckily, we have achieved the list of financed projects!
Presentation: Consortium Consortium: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Minimum number of participants.
This aid finances Proyectos:

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Measuring, assessing and standardizing/certifying future-proof cryptographyAddressing gaps between the theoretical possibilities offered by quantum resistant cryptography and its practical implementationsQuantum resistant cryptographic primitives and protocols encompassed in security solutionsSolutions and methods that could be used to migrate from current cryptography towards future-proof cryptographyPreparedness for secure information exchange and processing in the advent of large-scale quantum attacks The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:During the next decades the European Union should seize the opportunities that quantum technologies will bring. However, quantum technologies will also pose a significant risk to the security of our society. The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization an... see more

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Measuring, assessing and standardizing/certifying future-proof cryptographyAddressing gaps between the theoretical possibilities offered by quantum resistant cryptography and its practical implementationsQuantum resistant cryptographic primitives and protocols encompassed in security solutionsSolutions and methods that could be used to migrate from current cryptography towards future-proof cryptographyPreparedness for secure information exchange and processing in the advent of large-scale quantum attacks The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:During the next decades the European Union should seize the opportunities that quantum technologies will bring. However, quantum technologies will also pose a significant risk to the security of our society. The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded -including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future is a few decades away. There is a need to advance in the transition to quantum-resistant cryptography.

Applicants should propose approaches to tackle the abovementioned challenges, with the goal to develop cryptographic systems that are secure against attacks using both quantum or/and classical computers. Proposals may also try to better understand the expected capabilities of quantum computers (e.g. novel relevant quantum algorithms) and to further assess their implications to cybersecurity.

The proposed actions responding to this topic should take stock of and build on the relevant outcomes from other research fields (such as mathematics, physics, electrical engineering) and actions (e.g. H2020 projects, NIST Post-Quantum Cryptography competition, efforts in ETSI), and are encouraged to plan engaging and cooperating with them to the extent possible. Participation of SMEs is encouraged.

Applicants should demonstrate innovative ways to design, build, and deploy the new quantum-resistant infrastructures (including relevant hardware, software and IT processes). This should include switching from nowadays infrastructures to the proposed new ones with practical migration paths, aiming to efficiently manage the total time needed and the total costs associated, while also paying attention to affordable energy consumption.

Applicants should look at the implementation of quantum-resistant algorithms on software as well as specific hardware, such as. resource constrained IoT devices, smart cards, high-speed field-programmable gate arrays.

Proposals should devise, develop and validate metrics, methodologies, conformity assessment tests and tools for assessing and quantifying the security and the privacy of the proposed systems and services. Furthermore, proposals should strive to encompass a thorough comprehensive security evaluation of the engineering and deploying of efficient and secure implementations of the proposed solutions. Due consideration should be given to countermeasures against side channel attacks.

Applicants should strive to use the most promising relevant cryptographic primitives as well as to adapt the used cryptographic protocols accordingly.

Proposals may analyse how to develop combined quantum-classical[1] cryptographic solutions in Europe, for those use cases where these hybrid solutions might bring gains to the overall security. To this end, the analysis should take into account relevant actions in quantum cryptography (e.g. H2020 OpenQKD project, EuroQCI).

Proposals should validate their concept by exercising and deploying pilot demonstrators in relevant use cases. The demonstrators should include exercises on executing different migration strategies for real use cases and applications that would allow their implementation in large-scale, complex systems. Lessons learned from the exercises should be transformed into practical, multidisciplinary guidelines that support entities to plan and execute their own migration, considering the technical, the economical and legal contexts.

For expanding the proposed work in terms of including additional quantum-resistant infrastructures, additional pilot sites, additional countries and users the actions may involve financial support to third parties in line with the conditions set out in Part B of the General Annexes. Each consortium will define the selection process of the third parties for which financial support will be granted (typically in the order of EUR 50 000 to 300 000 per party). Up to 20% of the EU funding requested by the proposal may be allocated to the purpose of financial support to third parties.

In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 6 by the end of the project – see General Annex B.




Cross-cutting Priorities:Digital AgendaArtificial Intelligence


[1]Here “classical” is used with the meaning of non-quantum. Hence “post-quantum cryptography” is considered as advanced classical cryptography.

see less

Temáticas Obligatorias del proyecto: Temática principal: Internet of Things embedded/pervasive systems Post-quantum cryptography Digital Agenda Artificial Intelligence Cryptology (Cryptography and Cryptanalysis) Measurement and assessment of security levels.

Consortium characteristics

Scope European : The aid is European, you can apply to this line any company that is part of the European Community.
Tipo y tamaño de organizaciones: The necessary consortium design for the processing of this aid needs:

characteristics of the Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
Do you want examples? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Financial Chapters: The chapters of financing expenses for this line are:
Personnel costs.
Expenses related to personnel working directly on the project are based on actual hours spent, based on company costs, and fixed ratios for certain employees, such as the company's owners.
Subcontracting costs.
Payments to external third parties to perform specific tasks that cannot be performed by the project beneficiaries.
Purchase costs.
They include the acquisition of equipment, amortization, material, licenses or other goods and services necessary for the execution of the project
Other cost categories.
Miscellaneous expenses such as financial costs, audit certificates or participation in events not covered by other categories
Indirect costs.
Overhead costs not directly assignable to the project (such as electricity, rent, or office space), calculated as a fixed 25% of eligible direct costs (excluding subcontracting).
Madurez tecnológica: The processing of this aid requires a minimum technological level in the project of TRL 6:. Se cuenta con prototipos piloto capaces de desarrollar todas las funciones necesarias dentro de un sistema determinado, habiendo superado pruebas de factibilidad en condiciones de operación o funcionamiento real. + info.
TRL esperado:

Characteristics of financing

Intensidad de la ayuda: Sólo fondo perdido + info
Lost Fund:
0% 25% 50% 75% 100%
For the eligible budget, the intensity of the aid in the form of a lost fund may reach From a 70% up to a 100%.
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities. The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Guarantees:
does not require guarantees
No existen condiciones financieras para el beneficiario.

Additional information about the call

incentive effect: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
non -competitive competitive Very competitive
We do not know the total budget of the line
minimis: Esta línea de financiación NO considera una “ayuda de minimis”. You can consult the regulations here.

other advantages

SME seal: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Transition towards Quantum-Resistant Cryptography ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Sin info.
HORIZON-CL3-2022-CS-01-03 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada does 8 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada does 8 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada does 8 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada does 2 years | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada | next call scheduled for the month of