New Directions in Efficient and Tamper Resilient Public Key Cryptography for Ubi...
New Directions in Efficient and Tamper Resilient Public Key Cryptography for Ubiquitous Computing
Emerging ubiquitous devices such as WSN nodes and RFID tags, which have extremely limited resources, require complex cryptographic algorithms for security & privacy. While widely used cryptographic algorithms are known to be stron...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
POPSTAR
Reasoning about Physical properties Of security Protocols wi...
1M€
Cerrado
AMAskZONE
Generation and Verification of Masking Countermeasures Again...
1M€
Cerrado
SWORD
Security Without Obscurity for Reliable Devices
2M€
Cerrado
REASSURE
Robust and Efficient Approaches to Evaluating Side Channel a...
4M€
Cerrado
CNTM
Cryptography on Non Trusted Machines
873K€
Cerrado
BAHCESEHIR UNIVERSITESI
No se ha especificado una descripción o un objeto social para esta compañía.
Presupuesto del proyecto
100K€
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
Emerging ubiquitous devices such as WSN nodes and RFID tags, which have extremely limited resources, require complex cryptographic algorithms for security & privacy. While widely used cryptographic algorithms are known to be strong against computational resources of an attacker, the real threat comes from fault and side-channel attacks which try to extract the cryptographic key by utilizing the flaws in the implementation of an algorithm rather than the algorithm itself, e.g. side-channel attacks exploit information such as timing, power dissipation or electromagnetic emanation. This threat becomes more significant for WSN nodes, or RFID tags, with limited cryptographic capabilities and air as the easily tappable communication medium. Hence, it is crucial that cryptographic algorithms for these devices are implemented targeting side-channel resistance and tamper-resilience as well as performance. This project has three main objectives: 1) Investigation of efficient frequency domain arithmetic algorithms for standard cryptographic schemes; 2) Investigation of the feasibility of area/power-efficient realization of these algorithms for constrained ubiquitous devices through proof-of-concept implementations; 3) Investigation of the potential inherent tamper-resilience and side-chanel resistance of frequency domain arithmetic for robust cryptographic implementations. This timely and interdisciplinary project will draw knowledge from diverse fields such as hardware engineering and applied mathematics to provide security to emerging ubiquitous devices. It will also help with the successful reintegration of Dr. Baktir into the European Research Area and give him the necessary resources to establish his research in Europe. Furthermore, it will significantly help transfer of knowledge to the host through cutting edge research, lasting co-operation with the third country and training of young researchers, and thus contribute to the European excellence in research.