[crypto] [tanja at hyperelliptic.org: Complete program Crypto Working Group, March 1st 2013]

R. Hirschfeld ray at unipay.nl
Thu Feb 28 19:38:58 CET 2013


------- Start of forwarded message -------
Date: 28 Feb 2013 16:46:20 -0000
From: Tanja Lange <tanja at hyperelliptic.org>
Subject: Complete program Crypto Working Group, March 1st 2013


CRYPTO WORKING GROUP 
Friday, March 1, 2013
De Kargadoor (http://www.kargadoor.nl/utrecht/zaalverhuur.html)
Oudegracht 36, Utrecht

Program

10:45 - 11:30    Thijs Laarhoven (TU/e),
		The Shortest Vector Problem in Lattices Faster Using Quantum Search

11:30 - 11:45    Coffee / tea break
 

11:45 - 12:30     Wouter Lueks (RU Nijmegen),
		Forward Secure and Efficient Distributed Encryption
		(Abstract below)

12:30 - 14:00    Lunch break (lunch not included)

14:00 - 14:45     Francesco Regazzoni (ALaRI - USI, Lugano),
		Towards the Automatic Application of Countermeasures Against Physical Attacks
		(Abstract below)

14:45 - 15:00     Coffee / tea break

15:00 - 15:45  Peter Schwabe (RU Nijmegen),
		NaCl on small devices 

 

Abstract talk Wouter Lueks, Forward Secure and Efficient Distributed Encryption

Distributed encryption is an existing cryptographic primitive that is used to implement revocable privacy. It allows a recipient of a message to decrypt it only if that message has been encrypted sufficiently often by different senders. When applying the implementation by Hoepman and Galindo in practice, two issues become apparent. First, to limit which encryptions can be combined to recover the plaintext, the system needs to be restarted frequently with new key material. Second, the solution is generally too inefficient.

In this talk I will introduce distributed encryption and show how new keys can be generated locally from old keys, without communication, thus forgoing the need for generating them in advance. Furthermore, I will describe a batched distributed encryption scheme that is much more efficient, at the cost of using storage linear in the size of the plaintext domain.

 

Abstract Francesco Regazzoni, Towards the Automatic Application of Countermeasures Against Physical Attacks

Physical attacks exploit the physical weaknesses of cryptographic devices to reveal the secret information stored on them and pose a major security threat for embedded systems. Countermeasures against these attacks are often considered only in the later stages of the full design flow, and applied manually by designers with strong security expertise. This approach, however, negatively affects the robustness, the cost, and the production time of secure devices.

In view of this increasingly relevant problem, it is crucial to address the design challenges associated with the proliferation of physical attacks, developing a methodology to automate the design of secure embedded systems.

This talk focuses on one type of physical attacks, the differential power analysis (DPA), and presents the design and the implementation of the infrastructure needed to enable the automatic application of DPA countermeasures at hardware and software level.
------- End of forwarded message -------


More information about the crypto mailing list