Projects
Modular Analysis and Design of Hash Functions and Block Ciphers. KU Leuven
Block Ciphers and Encryption Schemes. KU Leuven
Snowden's alarming disclosures on NSA's global surveillance are an evidence of the paramount importance of cryptography to our daily lives. Also, attacks on widely used functions such as SHA-1 triggered international competitions for cryptographic functions. This project is about encryption, ranging from the construction of block ciphers (basic mathematical building blocks) to various types of encryption schemes. Encryption finds a wide range ...
Mathematical aspects of evaluating the security of block ciphers with respect to linear and differential cryptanalysis. KU Leuven
Currently, the only method known to achieve absolute security, is the One-Time Pad, which uses impractically long keys. For all modern purposes we use encryption methods that have no proof of absolute security. Instead, we can prove that certain classes of attacks do not work or that they would require a very large amount of computations or certain extra information. The study of the security of encryption methods against various attacks is ...
Automated techniques for the cryptanalysis and design of symmetric-key ciphers and protocols. KU Leuven
Cryptography is the study of mathematical techniques that ensure the confidentiality and integrity of information. This relatively new field started out as classified military technology, but has now become commonplace in our daily lives. Cryptography is not only used in banking cards, secure websites and electronic signatures, but also in public transport cards, car keys and garage door openers. Two building blocks in the domain of ...
Crptanalysis of ARX Ciphers KU Leuven
Cryptographic primitives are designed such that they can resist mathematical attacks (cryptanalysis). For their implementations, extra measures must be taken to also provide security against physical attacks such as side-channel analysis (SCA). One of the techniques that successfully prevents SCA is the use of masking methods, based on secret sharing and multi-party computation.
Such countermeasures significantly increase the area of a ...
New Methods in White-Box Cryptography KU Leuven
As cryptography is becoming ubiquitous in our digital systems, cryptographic implementations are being deployed in unprotected devices that might get compromised by malicious parties. However, cryptographic primitives are designed to provide security in the black-box model, where attackers can only tamper with the inputs and outputs of the primitive, but they do not offer protection against white-box attackers, who can gain full control over ...
Advanced Methods in Cryptanalysis KU Leuven
Cryptology (i.e., secret- or code-writing) is an important aspect of modern day life and economy. Roughly speaking, cryptology can be viewed as being composed of two parts: cryptography, which deals with the design of crypto algorithms, and cryptanalysis (sometimes called code-breaking), which deals with the security assessment of these algorithms. As a civilian field, progress in cryptanalysis has always been tied to advances in ...
Design of Application-specific Hash Functions KU Leuven
The security of symmetric-key cryptographic constructions is often studied based on the assumption that underlying primitives are secure. Hence, well-analyzed primitives are extremely important for the design of efficient and secure cryptographic schemes and protocols. Unfortunately, only a few types of dedicated primitive designs have received sufficient attention from the cryptanalysts. Therefore, it is necessary to build generic building ...