Primitives

Cryptography-based security solutions heavily rely on cryptographic primitives such as encryption and signature schemes. However, existing primitives are threatened by attacks which are made possible by new computing architectures and algorithms. Also, new cryptographic solutions require efficient primitives with new functionalities such as fully homomorphic encryption. Thus, the goal of this project area is the development of the required cryptographic primitives. They must be efficient in present and future computing environments, and must resist novel attacks due to new hardware platforms and algorithmic advances.

P3 - Hardware-Entangled Cryptography

 

Physically Unclonable Functions (PUFs) are a promising approach to realize minimal trust anchors for embedded devices. This project will design novel PUF-based security primitives. On top of this, it will build efficient and scalable PUF-based device identification and authentication schemes providing intrinsic protection against basic hardware attacks. The project will develop a formal security framework to analyze the security of the developed solutions according to modern cryptographic standards.

Researchers

Ghada Dessouky

System Security Lab

Interests:

  • Secure Computation.
  • Hardware-based Security.
  • Reconfigurable Devices.

Nikolaos Athanasios Anagnostopoulos

Security Engineering Group

Interests:

  • Hardware security.
  • Internet of Things (IoT).
  • Embedded systems.
  • Special focus on the security applications of Physical Unclonable Functions (PUFs).

André Schaller

Security Engineering Group

Interests:

  • Hardware-based security.
  • Security for embedded systems.
  • Internet of Things.
  • Lightweight cryptography with a strong focus on Physical Unclonable Functions (PUFs).

Dr. Sebastian Gabmeyer

Security Engineering Group

Duc Thien Nguyen

System Security Lab

Interests:

  • Operating System Security
  • Mobile Systems Security
  • Network Security
  • Cryptography

Sebastian Stammler

Security Engineering Group

 

CROSSING Publications P3

Additional Attributes

Type

It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs

Shaza Zeitouni, David Gens, Ahmad-Reza Sadeghi
In: Design Automation Conference (DAC) 2018, June 2018
[Inproceedings]

SFB 1119 - Contact


Contact P3

Ahmad-Reza Sadeghi
System Security Lab
Mornewegstrasse 32
64293 Darmstadt

Stefan Katzenbeisser
Security Engineering Group
Computer Science Department
Technische Universität Darmstadt
Hochschulstrasse 10
64289 Darmstadt

 

Funded by

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang