Attending

 

Members

John Bradley, Independent

Rob Carter, Duke, (Chair) 

Richard Frovarp (CTAB Representative to CACTI)

Stoney Gan, University of South Florida

Kevin Hickey, Detroit Mercy

Barry Johnson, Clemson University

Marina Krenz, REN-ISAC 

Les LaCroix, Carleton College

Internet2 

Ann West 

Regrets
Mike Grady

Steven Premeau

Kevin Morooney

Nicole Roy

Licia Florio

Steve Zoppi

Erik Scott


  1. Notes

    1.  Administrivia
      1. Internet2 Intellectual Property Agreement reminder
      2. CACTI Charter pointer
      3. Agreements:
        1. Please say your name when you start to speak, until we learn each others' voices
        2. Please ask colleagues to define terms, expand acronyms, etc, until we learn each others' jargon
        3. It's ok to challenge your colleagues in pursuit of quality of discourse. Hopefully in a nice way
        4. Please disclose any conflicts of interest you may have in any of the agenda topics, and potentially excuse yourself from the relevant conversations
      4. Volunteer(s) to scribe (new standing item)
      5. Agenda bash
    2. Announcements
        1. CACTI face-to-face at TechEx? If so, we should register for a side meeting at TechEx (Nicole can help do that)
          1. Several people said they were tentative, with a few folks saying it was pretty firmly in their plans.  The agenda for the non-ACAMP part of TechEX is already fixed, but we can make a face-to-face CACTI meeting an open meeting.  We are planning to have a Community communication published by TechEx, and the open meeting would be an opportunity to have a community discussion.
    3. Main Business
      1. Working group updates
        1. SAML subject identifier adoption WG (Les/Steven) 
          1. This is no longer an active priority in TAC, but can be (re)started when it does become a priority again.
        2. Linking SSO WG (Rob)
          1.  last meeting was canceled in favor of members working on documenting use cases.  There is a meeting next week which will start discussing the results of those write-ups.  WG work-product is expected to be documentation published in late fall.
        3. Others?- CTAB service catalog discussion?
      2. Comms assignment(s)/volunteer(s) for 1H22 (cf.: Potential communication points)
        1. Reviewed five potential topics
          1. Shell4J and dependency/supply-chain vulnerabilities (covered previously, and possibly more TAC-oriented topic
          2. DiD/wallets/verifiable credentials and implications for federation (agreed this would need to be covered along with TAC / CTAB)
            1. Also noted that post-quantum crypto might be a more forward-looking topic in the same vein
          3. Making the case for multilateralism in an increasingly bilateral world (agreed this could be a combined topic with TAC and CACTI)
          4. Making the case for IAM as a first-class institutional priority (this one seems to be squarely in CACTI's space and mostly outside other adv. groups' spaces)
          5. Expanding audiences / constituencies for federated IAM (this one also seems to be something CACTI could lead the conversation on, poss. with input from other groups)
        2. May be appropriate to angle for one or more IAM Online presentations on these or related topics
        3. Multiple folks are willing to participate if we pin down topics and times for IAM Online presentations
      3. Update on Global CEO Forum discussion of July 6th (Kevin M) (Kevin M out of the office, will get this update on the next call -Nicole)
      4. Post-quantum crypto (Chris, Nicole, Kevin H)
        1. With Chris and Nicole out of pocket, we really only scratched the surface of this topic
        2. Much of our existing security and identity infrastructure depends sensitively on cryptographic methods (encryption, digital signatures, etc.)
        3. Those cryptographic approaches all depend, one way or another, on there being pairs of "companion" mathematical operations where one operation is computationally "easy" and one is computationally "hard" – multiplying large numbers vs. factoring large numbers, computing products in complex fields versus computing discrete logarithms, etc.
        4. Indications are that quantum computing is moving forward faster than originally anticipated.  Once someone (read: governments) reach "quantum supremacy", those "hardness" assumptions may no longer apply – factoring large numbers and computing discrete logarithms are known to be much more tractable problems with quantum computers
        5. NIST has published recommendations for a new class of crypto algorithms (3 so far – two encryption algos and one signing algo)  using quantum-proof mathematics (lattice math, etc.).  These algorithms are significantly more complicated and expensive to implement, and may require significantly more storage / different hardware acceleration
        6. There is reason to believe that even if quantum supremacy isn't reached for another 10 years, there are agencies actively collecting data now  with the intent of using it to crack keys then , and with the enormous lead-time required to shift crypto strategies and key exchange mechanisms, it's not too early to start thinking about how to prepare for a post-quantum world


Next Meeting: Tuesday, August 2, 2022

  • No labels