< Back to previous page


Theory Meets Practice for Secure Embedded Devices.

We use embedded devices, such as computing devices (computers, smart phones), smart cards (ID cards and passports, payment cards smart meters) and set-top boxes widely in our daily life. Some of these devices possess or communicate sensitive information, which brings the necessity to use cryptographic algorithms in order to protect them. Unfortunately, the easily accessible nature of these devices combined with naive implementations makes them prone to implementation attacks, even with mathematically secure cryptographic algorithms. In this project we mainly consider countermeasures against implementation attacks that use side channel information such as power consumption and electro-magnetic radiation of the device without tampering it. There exist countermeasures, where masking and leakage resilient algorithms are examples, that provide provable security. Practicality of these countermeasures is as important as their theoretical security. Specifically, these countermeasures are expected to be lightweight in terms of gate count, power consumption and randomness requirements in addition to providing security in a wide range of devices. Here, we will provide theoretical bounds for resource requirements and methods in order to reach these bounds. Moreover, we will design algorithms/countermeasures that provide security against stronger adversaries by analyzing the leakages on a wide range of devices.

Date:1 Oct 2015 →  28 Apr 2019
Keywords:Secure Embedded Devices
Disciplines:Computer hardware, Computer theory, Scientific computing, Other computer engineering, information technology and mathematical engineering