Analysis and Protection of Lightweight Cryptographic Algorithms

SCHEME: CORE

CALL: 2019

DOMAIN: IS - Information Security and Trust Management

FIRST NAME: Alex

LAST NAME: BIRYUKOV

INDUSTRY PARTNERSHIP / PPP:

INDUSTRY / PPP PARTNER:

HOST INSTITUTION: University of Luxembourg

KEYWORDS: Lightweight Cryptography, Cryptanalysis, Authenticated Encryption, Hash Function, Side-Channel Attacks, Differential Power Analysis, Countermeasures, Leakage-Resilience

START: 2020-01-01

END:

WEBSITE: http://www.uni.lu

Submitted Abstract

The Internet of Things (IoT) represents the next phase of the evolution of the Internet towards a network that integrates the physical world into the virtual world. In the near future, the vast majority of devices connected to the Internet will not be classical computers like PCs, laptops, or smart phones, but miniature sensor nodes, actuators, and various other kinds of “smart” devices with computation and communication capabilities. This evolution will create a strong demand for lightweight cryptographic algorithms that are suitable for devices with extreme resource constraints such as RFID tags. Recently, the US National Institute of Standards and Technology (NIST) announced an initiative to standardize lightweight hash functions and authenticated encryption schemes in an open process with public evaluation. The mission of the APLICA project is to contribute to the evaluation of the more than 50 candidate algorithms submitted to the NIST by analyzing their theoretical and practical security properties. More concretely, APLICA will contribute to the development of new cryptanalytic techniques (including new software tools for cryptanalysis) that can be applied to lightweight authenticated encryption algorithms and hash functions, and to the design and implementation of new countermeasures against side-channel attacks, in particular differential power analysis, that are suitable for resource-constrained IoT devices. Both topics have the potential to create significant real-world impact since the NIST-standardized algorithms will likely get deployed in billions of devices.

This site uses cookies. By continuing to use this site, you agree to the use of cookies for analytics purposes. Find out more in our Privacy Statement