Crypto Café

(back to Crypto Café main page)

Past Presentations

October 17, 2024, 10:00 am   

Speaker: Ruslan Ospanov (Eurasian National University, Kazakhstan)

Title: The MCDM-RL-based Framework for Consensus Protocol Selection for IoT networks.

Abstract.  This topic is a part of my PhD research topic: “Design and analysis of cryptographic algorithms and protocols for solving the problem of consensus in distributed ledger technologies”.

Reinforcement learning (RL) has played a key role in the rapid development of artificial intelligence technologies that has been observed over the past decade. Reinforcement learning methods have shown impressive results in a range of fields. Specifically, RL is widely applied in robotics, control systems, and the Internet of Things (IoT) to address challenges in automation, optimization, and the management of complex systems. The IoT is also a major area for the implementation of distributed ledger and blockchain technologies, which provide effective solutions to overcome the limitations of conventional IoT applications. A key element of the distributed ledger reference architecture is the consensus layer, which handles agreement among network nodes, ensuring the ledger’s state remains consistent while maintaining data security, accuracy, and protection. The selection of a consensus protocol plays a crucial role in determining the performance and security of the blockchain system.

This talk is devoted to the issue of selection a blockchain consensus protocol for IoT networks using the combined application of multi-criteria decision making (MCDM) and reinforcement learning (RL) methods. In this talk, I will consider an idea of integration multi-criteria decision making and reinforcement learning methods to blockchain consensus protocol selection for IoT. It proposes a combined consensus protocol selection and management system for IoT networks based on the multi-criteria decision making method and reinforcement learning.

Bio: Ruslan Ospanov has been engaged in scientific and educational activities in the field of mathematics and cryptography for more than 20 years, has dozens of scientific and scientific-methodological works, as well as several copyright certificates from Qazpatent (National Institute of Intellectual Property of the Ministry of Justice of the Republic of Kazakhstan (NIIP)). He worked as a teacher in various universities of Kazakhstan (Karaganda State University named after academician E.A. Buketov, L.N. Gumilyov Eurasian National University and other). He is also a research fellow at the Research Institute of Information Security and Cryptology of L.N. Gumilyov Eurasian National University. Since September 2022, he has been a doctoral student at the Eurasian National University named after L.N. Gumilyov, specializing in Information Security Systems.

Video Recording

 

October 3, 2024, 10:00 am   

Speaker:  Dr. Veronika Kuchta, Assistant Professor, Florida Atlantic University           FLYER

Title: Proximity gaps for Reed-Solomon Codes and their Application in Interactive Oracle Proofs of Proximity and ZK-SNARKs

Abstract: Reed-Solomon codes have long been a fundamental tool of error correction and data integrity, but their applications extend far beyond traditional coding theory. In this talk, I will explore the concept of    proximity gaps   within Reed-Solomon codes—specific measures of how far a received word is from the closest codeword—and their critical role in the design and analysis of advanced cryptographic protocols, such as Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (ZK-SNARKs) and Interactive Oracle Proofs of Proximity (IOPPs).

Video Recording


September 19, 2024, 10:00 am   

Speaker:  Dr. Shi Bai, Associate Professor, Florida Atlantic University        FLYER

Title:  Lattice-based Cryptography: Construction and Analysis

Abstract: Lattice-based Cryptography holds a great promise for post-quantum cryptography.  It enjoys strong security based on the so-called worst-case to average-case redution; relatively efficient implementations, as well as algorithmic simplicity.  In this talk, we will discuss a post-quantum scheme based on lattice; and several algorithms for evaluating the security of average-case/worst-case problems in lattice-based cryptography.  

Video Recording

September 5, 2024, 10:00 am  

Speaker:  Dr. Edoardo Persichetti, Associate Professor, Florida Atlantic University    FLYER

Title: A Brief Introduction to Code-Based Cryptography

Abstract: Code-based cryptographic primitives are among the main solutions for Post-Quantum Cryptography, the area of study in charge of protecting our information and communication in the presence of quantum adversaries. In this talk, I will briefly walk through the history of this field, highlighting the main constructions, modern approaches, and recent developments. Everyone welcome!

Video Recording

April 8, 2024, 10:00 am      

Speaker:  Dr. Francesco Sica, Assistant Professor, Florida Atlantic University    FLYER

Title: Acceleration of multiscalar multiplication for zkSNARKs

Abstract: The main computational bottleneck in the implementation of zero-knowledge succinct arguments of knowledge (zkSNARKs) based on elliptic curves, such as Pinocchio, is the evaluation (called multiscalar multiplication) $\sum_{i=1}^n a_i P_i$, where the $a_i$’s are scalar and the $P_i$’s are fixed elliptic curve points. We will review currently used techniques and introduce new improvements. 
This is joint work with Xinxin Fan, Veronika Kuchta and Lei Xu.

Video recording

March 25, 2024, 10:00 am 

Speaker: Xinxin Fan, IoTeX

Title: Zero-Knowledge Proofs - An Industry Perspective

Abstract: The main computational bottleneck in the implementation of zero-knowledge succinct arguments of knowledge (zkSNARKs) based on elliptic curves, such as Pinocchio, is the evaluation (called multiscalar multiplication) 

∑i=1naiPi\sum_{i=1}^n a_i P_i

Bio: Dr. Xinxin Fan is the Head of Cryptography at IoTeX, a Silicon Valley-based technology platform that empowers the emerging machine economy with innovative combination of blockchain and IoT. He is responsible for directing the company’s strategy and product roadmaps as well as developing the core technologies and IP portfolio. Before joining IoTeX, he was a senior research engineer of the Security and Privacy Group at Bosch Research Technology Center North America. Dr. Xinxin Fan received his Ph.D. in Electrical and Computer Engineering from the University of Waterloo in 2010. He has published 60+ referred research papers in top-tier journals, conferences and workshops in the areas of cryptography and information security and is an inventor of 17 patent filings for innovative information security and privacy-enhancing technologies. He is also a Certified Information Systems Security Professional (CISSP) from (ISC)^2 and a (co-)chair of IEEE P2418.1 and IEEE P2958 standards working groups.

Video Recording

March 11, 2024, 10:00 am   

Speaker: Dr. Jason LeGrow, Virginia Tech 

Title: Post-Quantum Blind Signatures from Group Actions

Abstract: Blind signatures are a kind of cryptographic scheme which allows a User to receive a Signer’s signature on a message, in such a way that the message is not revealed to the Signer. Blind signatures can be used in many applications, such as a electronic voting and anonymous purchasing. To resist attacks by quantum computers, we must design blind signature schemes based on computational problems which are believed to be hard for quantum computers: so-called post-quantum protocols. I will discuss techniques for constructing post-quantum blind signatures from cryptographic group actions in the setting of isogeny-based cryptography and code-based cryptography.

Video recording

February 26, 2024, 4:30 pm   

Speaker: Dr. Lukas Koelsch, Assistant Professor, University of South Florida 

Title: A general and unifying construction for semifields and their related maximum rank distance codes

Abstract   : Semifields are algebraic structures that can be for instance used to construct nondesarguesian planes in finite geometry, as well as maximum rank distance (MRD) codes with special parameters (more precisely, every element in the code will be a square matrix with full rank). Many constructions of MRD codes are rooted in ideas from semifield theory. Interestingly, many known constructions of semifields only exist in even dimension (i.e. the dimension over the prime field is even), leading to MRD codes in even dimension or MRD codes in odd dimension over a field of even degree. In this talk, we present a unifying construction for almost all semifields of this type, including semifields found by Dickson, Knuth, Hughes-Kleinfeld, Taniguchi, Dempwolff, Bierbrauer, Zhou-Pott in the last 120 years. Our construction recovers all these semifields, and gives many new examples.

Video Recording

February 12, 2024, SE 43 - room 215, 10 am    

Speaker: Merve Karabulut, Florida Atlantic University

Title: Number Theoretic Transform: A Python-based Speed Enhancement

Abstract: Our proposal involves a Python-based solution that utilizes Numba's just-in-time compilation capabilities. We aim to optimize the control flow of the Number Theoretic Transform (NTT) operation to exploit parallelism in modern CPUs. Our solution leverages multi-core processing, multi-threading, and cache memory.

Speaker biography: Merve is a computer engineering graduate from Yildiz Technical University, with experience in full-stack development and blockchain, especially with Hyperledger. At FAU, she is working towards a Ph.D., focusing on PQC with Dr. Reza Azarderakhsh. Her goal is to create secure solutions resistant to quantum computing and efficient implementation of algorithms.

Video Recording

January 29, 2024, SE 43 - room 215, 10 am   

Speaker:  Dr. Vincenzo Pallozzi Lavorante, Postdoctoral fellow, University of South Florida 

Title: Locality and complexity distribution in coding theory, an approach based on Galois theory

Abstract: The storage of information and the necessity to ease the heaviness of big data computations are two key aspects to consider when investigating new problems in coding theory.  The concept of locality is closely linked to the reliability of distributed storage systems, while matrix multiplication is often the first operation required for secure distribution. This presentation will provide an overview of the latest developments and explore how Galois theory can offer valuable tools for addressing and contributing to these areas.

Bio: Dr. Pallozzi Lavorante received a Ph.D. in Mathematics in 2022 from the University of Modena and Reggio Emilia in Italy. Since August 2022 he has been a Postdoctoral fellow at the University of South Florida. His research interest focuses on Galois Theory and polynomials over finite fields with applications to coding theory, code-based cryptography, and finite geometry.

Video recording

 

December 5, 2023, SE43 - room 215, 10 am     

Speaker:   Dominic Gold, Florida Atlantic University

Title: TDA-Preprocessing Yields Quantifiable Efficiency Gains in Privacy-Preserving ML Models 

Abstract:  Computational tools grounded in algebraic topology, known collectively as topological data analysis (TDA), have been used for dimensionality-reduction to preserve salient and discriminating features in data. TDA's flagship method, persistent homology (PH), extracts distinguishing shape characteristics from the data directly and provide inherent noise-tolerance and compact, interpretable representations of high-dimensional data that are amenable to well-established statistical methods and machine learning (ML) models; this faithful but compressed representation of data motivates TDA's use to address the complexity, depth, and inefficiency issues present in privacy-preserving, homomorphic encryption (HE)-based ML models through ciphertext packing---the process of packing multiple encrypted observations into a single ciphertext for Single Instruction, Multiple Data (SIMD) operations.

By investigating several TDA featurization techniques on the MNIST digits dataset using a logistic regression (LR) classifier, we demonstrated that the TDA methods chosen improves encrypted model evaluation with a 10-25 fold reduction in amortized time while improving model accuracy up to 1.4% compared to naive reductions that used downscaling/resizing. The developed technique also has implications for multiclass classification by sending multiple model classifications in a single packed ciphertext to reduce the communication overhead between the Client and Server, potentially avoiding restriction to a binary classification (as done in past HE-ML literature for secure classification of MNIST digits).

Biography:  Dominic Gold is a 6th-year graduate teaching assistant at Florida Atlantic University who studies both cryptography and data science, with his main interest in secure/privacy-preserving machine learning on encrypted data. The intersectionality of his research in homomorphic encryption and topological data analysis shows promising implications for research in both fields, with his work in cryptography recognized by venues such as USENIX and ACM CCS. The ultimate goal of his work is to enable real-time predictions on encrypted biomedical data to improve both the reliability, security, and equitability of healthcare systems.

Video Recording

 

November 21, 2023, SE43 - room 215, 10 am    

Speaker:  Paolo Santini, Universita Polotecnica Delle Marche, Italy

Title: A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures

Abstract: The problem of determining whether two linear codes are equivalent is called Code Equivalence Problem. When codes are endowed with the Hamming metric (which is the most studied case), the equivalence is mainly considered with respect to monomial transformations (permutations with scaling factors) and the problem is known as the Linear Equivalence Problem (LEP). Code equivalence can be described as a transitive, non-commutative group action and, as such, finds a natural application in cryptography: for example, it is possible to design zero-knowledge proofs, and hence signature schemes. In recent works, it has been shown that LEP can be reformulated using notions such as information sets (arguably, ubiquitous objects in coding theory) and canonical forms. This unlocks some new features, such as the possibility of communicating the equivalence map in a very compact way (which leads to much shorter signatures), as well as opening new attack avenues. In this talk, we recall the basics of code equivalence and then focus on these recent results, aiming to describe how they can be applied to boost the performance of cryptographic schemes.

Video Recording

 

November 7, 2023, SE43 - room 215, 10 am    

Speaker: Zhenisbek Assylbekov, Department of Mathematical Sciences, Purdue University Fort Wayne, Fort Wayne, IN

Title: Intractability of Learning AES with Gradient-based Methods

Abstract: We show  the approximate pairwise orthogonality of a class of functions formed by a single AES output bit  under the assumption that all of its round keys except the initial one are independent. This result implies  the hardness of learning AES encryption (and decryption) with gradient-based methods. The proof relies on the Boas-Bellman type of inequality in inner-product spaces.

Keywords: Advanced Encryption Standard, Block Ciphers, Gradient-based Learning

Bio: Zhenisbek has a PhD in Mathematical Statistics from Hiroshima University. After the PhD and some period of work in industry, he got a job at Nazarbayev University, where he was working as a Teaching Assistant, Instructor, and Assistant Professor in the Department of Mathematics during 2011-2023. Currently, he is an Assistant Professor of Data Science at Purdue University Fort Wayne.  His research interests are in machine learning with applications to natural language processing (NLP). He is interested in both the theoretical analysis of machine learning algorithms and the practical implementation and experimental evaluation of such algorithms on text data. He is also interested in hardness of learning which is closely related to cryptography because cryptographic primitives are exactly what is hard for machine learning.

Video Recording

 

October 24, 2023, SE43 - room 215, 10 am  

Speaker:  William Youmans, Florida Atlantic University

Title: An algorithm for solving the principal ideal problem with subfields

Abstract:  The principal ideal problem (PIP) is the problem of deciding whether a given ideal of a number field is principal and, if it is, of finding a generator. Solving the PIP applies to solving major computational tasks in number theory. It is also connected to the search for approximate short vectors in so-called ideal lattices, which is a crucial problem in cryptography. We present a novel application of norm relations to utilize information from subfields to solve the PIP in fields of degree up to 1800.

Bio:  Dr. William Youmans received a BA in pure mathematics in 2017 and a PhD in mathematics in 2023 from the University of South Florida. Since May 2023 he has been a postdoctoral research fellow at Florida Atlantic University. His research interests include lattice-based cryptography, computational number theory, and quantum algorithms.

Video Recording

 

October 10, 2023, SE43 - room 215, 10 am  

Speaker:   Ngo, Tran, Ph.D. Candidate, Florida Atlantic University

Title:   Analysis for lattice enumeration

Abstract: Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in estimating the security of lattice-based cryptography. The subroutine in BKZ which needs to find the shortest vector in a projected sublattice can be instantiated with enumeration algorithms. The enumeration procedure can be seen as a depth-first search on some `"enumeration tree" whose nodes denote a partial assignment of the coefficients, corresponding to lattice points as a linear combination of the lattice basis with the coefficients. This work provides a concrete analysis for the cost of quantum lattice enumeration based on the quantum tree backtracking algorithm of Montanaro (ToC, '18). More precisely, we give a concrete implementation of Montanaro's algorithm for lattice enumeration based on the quantum circuit model. We also show how to optimize the circuit depth by parallelizing the components. Based on the circuit designed, we discuss the concrete quantum resource estimates required for lattice enumeration. This is a joint work with Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, and Tanja Lange.

Video Recording

 

September 26, 2023, SE43 - room 215, 10 am  

Speaker:  Yin, Zhijun, Instructor, Florida Atlantic University

Title:  Exploring the Power of Multivariate Public Key Cryptography (MPKC)

Abstract:  Multivariate Public Key Cryptography (MPKC) leverages multivariate quadratic polynomial mappings over finite fields as the foundation for its trapdoor one-way functions. This innovative approach offers remarkable efficiency in both encryption and decryption processes, making it a compelling choice for secure communications.

In contrast to traditional cryptographic methods, attacking MPKC involves solving a system of nonlinear equations over the finite field, a significantly more complex challenge than NP-hard problems like Boolean satisfiability, which is equivalent to solving equations over the finite field GF(2).

In this presentation, we will delve into MPKC through a simplified example featuring three variables within the finite field of GF(2). This illustrative toy example will demystify key concepts such as public and secret keys, encryption, decryption, and cryptanalysis. Join us as we unravel the intriguing world of MPKC and its potential impact on modern cryptography.

Video Recording

 

September 12, 2023, SE 43, room 215, 10 am  

Speaker :  Paul Zimmermann, Directeur de Recherche at INRIA/LORIA (Nancy, France)

Bio : Paul Zimmermann's research interests include asymptotically fast arithmetic, computer algebra and computational number theory. Together with Richard Brent, he has written the book "Modern Computer Arithmetic," and he has coordinated the book "Computational Mathematics with SageMath." He has contributed to some of the record computations in integer factorization and discrete logarithm. He is the author or co-author of several computer packages, including the GNU MPFR library providing arithmetic on floating-point numbers with correct rounding, and CADO-NFS, an implementation of the number field sieve for integer factorization. His latest project is CORE-MATH, an implementation of mathematical functions with correct rounding for the IEEE 754 standard formats.

Title : Deciphering Charles Quint (A diplomatic letter from 1547)

Abstract
 
: An unknown and almost fully encrypted letter written in 1547 by Emperor Charles V to his ambassador at the French Court, Jean de Saint-Mauris, was identified in a public library, the Bibliothèque Stanislas (Nancy, France). As no decryption of this letter was previously published or even known, a team of cryptographers and historians gathered together to study the letter and its encryption system. First, multiple approaches and methods were tested in order to decipher the letter without any other specimen. Then, the letter has now been inserted within the whole correspondence between Charles and Saint-Mauris, and the key has been consolidated thanks to previous key reconstructions. Finally, the decryption effort enabled us to uncover the content of the letter and investigate more deeply both cryptanalysis challenges and encryption methods.

Video Recording

 

August 29, 2023, SE43 - room 215, 10am 

Speaker:  Adam A Yergovich

Bio:  Adam Yergovich works for the Department of State, Bureau of Diplomatic Security as a Regional Cyber Security Officer currently stationed in Fort Lauderdale Florida.  He has previously been stationed in Frankfurt Germany, Bangkok Thailand, and Moscow Russia but traveled extensively within those regions.  He graduated from from the University of California Davis with a degree in Computer Science and Engineering and worked for several years designing single board computers for a small California company before joining State.  

Title:  Challenges in Securing a Worldwide Enterprise Network Footprint - The Basics from Australia to Zimbabwe.  

Abstract:  Many modern theories on Information Security rely on sophisticated and efficient infrastructure we take for granted in developed countries.  When operating in nearly every country in the world it is necessary to focus on the basics.  There might be questionable infrastructure or even openly hostile host nations, but basic "hygiene" is often the best roadmap to securing information and communication - and often the most neglected.

Video Recording

 

May 17, 2023, SE-43, Room 215;  11:00 a.m.  

Speaker:             Rick Hensbergen   (Esther.ai, Founder)

Title:  Performance of penetration testing to secure cloud-based solutions

Video Recording

 

April 24, 2023, SE-43, Room 215;  11:00 a.m.  

Speaker:     Ryan Keegan (University of California, San Diego).

Bio   :  Keegan Ryan is a 4th year PhD student advised by Prof. Nadia Heninger at the University of California, San Diego. His research interests include practical cryptanalysis of real-world systems, particularly problems involving lattice reduction.

Title:  Fast Practical Lattice Reduction through Iterated Compression

Abstract:  We introduce a new lattice basis reduction algorithm with approximation guarantees analogous to the LLL algorithm and practical performance that far exceeds the current state of the art. We achieve these results by iteratively applying precision management techniques within a recursive algorithm structure and show the stability of this approach. We analyze the asymptotic behavior of our algorithm, and show that the heuristic running time is  O(nω(C+n)1+ε)  for lattices of dimension  n,  ω∈  (2,3] bounding the cost of size reduction, matrix multiplication, and QR factorization, and  C  bounding the  log  of the condition number of the input basis  B. This yields a running time of  O(nω(p + n)1+ε)  for precision  p=O(log|B|max)  in common applications. Our algorithm is fully practical, and we have published our implementation. We experimentally validate our heuristic, give extensive benchmarks against numerous classes of cryptographic lattices, and show that our algorithm significantly outperforms existing implementations.

Video Recording

 

April 10, 2023, SE-43, Room 215;  11:00 am 

Speaker:  Cariel Cohen (CTO at  Securily)    (FLYER)

Bio:   With over 20 years of experience in the cybersecurity industry, our speaker is a co-founder and passionate coder with a love for cryptography, authentication and patents. He has extensive experience working with major public corporations, including Aqua Security, Sony Pictures, and 5B Technologies. Throughout his career, he has been dedicated to ethical hacking and compliance, ensuring that businesses remain secure and compliant in the face of emerging cybersecurity threats.

Title:  Securing Cloud Business Applications: A Practical Approach to Cybersecurity and Compliance

Abstract:   This topic explores practical approaches to securing business applications and addressing cybersecurity and compliance challenges faced by businesses in today's dynamic digital landscape. Cariel will share insights on best practices for securing cloud workloads, data, and applications, including implementing access controls, training employees on cybersecurity awareness, and protecting data against a variety of risks. Attendees will gain valuable knowledge and practical solutions that are used in helping businesses thrive in the face of emerging cybersecurity threats and ever-changing compliance requirements.

Video Recording

 

March 27, 2023, SE-43, Room 215:  11:00 am    

Speaker: David J. Wu (The University of Texas at Austin)

Bio: David Wu is an assistant professor in the Department of Computer Science at the University of Texas at Austin. He is broadly interested in applied and theoretical cryptography as well as computer security. Previously, David received a PhD in computer science from Stanford University in 2018 and was an assistant professor at the University of Virginia from 2019 to 2021. He has received the NSF CAREER Award, the Microsoft Research Faculty Fellowship, and a Google Research Scholar Award. His work has been recognized with a Best Paper Award at CRYPTO (2022), two Best Young-Researcher Paper Awards at CRYPTO (2017, 2018) and an Outstanding Paper Award at ESORICS (2016).

Title:  Succinct Vector, Polynomial, and Functional Commitments from Lattices

Abstract: In a functional commitment scheme, a user can commit to an input x and later on, open it to an arbitrary function evaluation f(x). We require that both the commitment and the opening be short. Important special cases of functional commitments include vector commitments and polynomial commitments. In this talk, I will introduce a new lattice-based framework for constructing functional commitments that supports functions computable by arbitrary (bounded-depth) Boolean circuits. Our constructions rely on a new falsifiable "basis-augmented SIS" assumption that we introduce, which can be viewed as a new "q-type" variant of the standard SIS assumption.
(Joint work with Hoeteck Wee)

Video Recording


March 13, 2023, SE-43, Room 215: 11:00 am

Speaker:    Corentin Jeudy    (IRISA, Rennes Cedex, France)

Title: On the Secret Distributions in Module Learning With Errors

Abstract:     The Module Learning With Errors (M-LWE) problem is a core assumption of lattice-based cryptography, and it underlies the security of the future post-quantum cryptography standards Kyber and Dilithium selected by NIST. The problem is parameterized by a secret distribution as well as an error distribution. There is a gap between the choices of those distributions for theoretical hardness results (uniform secret modulo q) and practical schemes (small bounded secret). In this talk, we narrow this gap by presenting three results focused on the secret distribution. We show that both search and decision M-LWE remain hard when the secret distribution is uniform over small bounded secret, provided that the rank is larger by a log(q) factor. We then show the hardness of search M-LWE for more general secret distributions carrying sufficient entropy.

This talk is based on the published papers "On the Hardness of Module Learning With Errors with Short Distributions" (Journal of Cryptology 2023) and "Entropic Hardness of Module-LWE from Module-NTRU" (Indocrypt 2022) which are joint works with Katharina Boudgoust, Adeline Roux-Langlois and Weiqiang Wen.

Video Recording


February 27, 2023, SE-43, Room 215:  11:00 am

Speaker: Mila Anastasova, Florida Atlantic University

Title:  Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4.

Abstract: The elliptic curve family of schemes has the lowest computational latency, memory use, energy consumption, and bandwidth requirements, making it the most preferred public key method for adoption into network protocols. Being suitable for embedded devices and applicable for key exchange and authentication, ECC is assuming a prominent position in the field of IoT cryptography. The attractive properties of the relatively new curve Curve448 contribute to its inclusion in the TLS1.3 protocol and pique the interest of academics and engineers aiming at studying and optimizing the schemes. When addressing low-end IoT devices, however, the literature indicates little work on these curves. In this presentation, we present an efficient design for both protocols based on Montgomery curve Curve448 and its birationally equivalent Edwards curve Ed448 used for key agreement and digital signature algorithm, specifically the X448 function and the Ed448 DSA, relying on efficient low-level arithmetic operations targeting the ARM-based Cortex-M4 platform. Our design performs point multiplication, the base of the Elliptic Curve Diffie Hellman (ECDH), in 3,2KCCs, resulting in more than 48% improvement compared to the best previous work based on Curve448, and performs sign and verify, the main operations of the Edwards curves Digital Signature Algorithm (EdDSA), in 6,038KCCs and 7,404KCCs, showing a speedup of around 11% compared to the counterparts. We present our novel modular multiplication and squaring architectures reaching ∼ 25% and ∼ 35% faster runtime than the previous best-reported results, respectively, based on Curve448 key exchange counterparts, and ∼ 13% and ∼ 25% better latency results than the Ed448-based digital signature counterparts targeting Cortex-M4 platform.

Video Recording


February 13, 2023, SE-43, Room 215; 11:30 a.m. 

Speaker:   Dr. Bill Brumley, Tampere University, Finland

Title:   Side Channel Analysis and Lattice Attacks

Abstract:   Lattice attacks are a typical endgame for side channel attacks targeting digital signature schemes. During the procurement phase, the attacker queries digital signatures, messages, and corresponding side channel traces, then tries to extract secret information from these traces and  apply lattice methods to recover the private key. But in practice, these traces are often incomplete and/or noisy, complicating theoretical models for applying lattices. In this talk, I discuss some of the lattice attack techniques developed over the years, and outline a few interesting open problems that highlight the gap between theory and practice for applied side channel attacks powered by lattice methods.

Video Recording


January 30, 2023, SE-43, Room 215; 11:00 a.m.

Speaker: Dr. Veronika Kuchta, Florida Atlantic University

Title:  Proof Systems and ZK-SNARKs

Abstract:      Zero-knowledge proof (ZKP) systems allow a prover holding some secret witness  for a statement x satisfying some NP relation R, to prove knowledge of w to a verifier (the soundness property), without revealing any information on w to the verifier (the zero-knowledge property) beyond that revealed by the NP statement x known to the verifier.   

ZKPs have a myriad of applications in privacy-preserving cryptographic protocols. For statements with large witnesses w, the main limitation of   classical ZKPs is that their proof size is proportional to the witness size. To support such applications like verifiable computation and privacy-preserving cryptocurrencies it is desirable to have succinct ZKPs in which  the proof (or argument) size is only  polylogarithmic in the witness size. This requirement induced constructions of Zero-Knowledge Succinct Non-interactive ARgument of Knowledge  (ZK-SNARK).  

In this presentation we will look at different approaches to designing efficient ZK-SNARKs from information-theoretical proof system especially focusing on lattice-based and hash-based ZK-SNARK constructions.

Video Recording


December 14, 2022, SE-43, Room 215;1:00 p.m.

Speaker: Jianfeng Xie, Department of Electrical and Computer Engineering, Villanova University (BIO)
Title: 
Hardware Acceleration for Post-Quantum Cryptography: Algorithmic Derivation, and Architectural Innovation
Abstract:  :
Post-quantum cryptography (PQC) has drawn significant attention from various communities recently as the existing public-key cryptosystems such as Rivest Shamir Adleman (RSA) and Elliptic Curve Cryptography (ECC) are proven to be vulnerable to the large-scale quantum computers executing Shor’s algorithm. The National Institute of Standards and Technology (NIST) has already started the PQC standardization process, and hardware acceleration for PQC algorithms is one of the recent focused topics. In this talk, I follow this trend to introduce several interesting methods to accelerate the PQC algorithms on the hardware platform. Specifically, this talk will present the hardware
implementation methods from the aspects of both algorithmic derivation and architectural innovation. Implementation techniques for a lightweight PQC scheme is also covered in this talk. I hope that this talk will facilitate more research to help the PQC standardization and further development.

 


October 18, 2022, SE-43, Room 215; 4:00 p.m.

Speaker : Shi Bai, Florida Atlantic University
Title : Subfield and sublattice algorithms for variants of NTRU
Abstract : The NTRU problem introduced by Hoffstein,  Pipher and Silverman is one of the fundamental problems in lattice-based cryptography. It has been used extensively as a security foundation, for public-key encryption, signatures, fully homomorphic encryption and many others. It has been realized that certain variants of NTRU such as the overstretched NTRU (NTRU variant with a large modulus) are easier than expected. The general strategy is to solve 'part' of the secret in a subfield or sublattice and then recover the full solution.  In this talk, we will survey and compare several subfield and sublattice algorithms for overstretched NTRU, and also give some concrete estimates for breaking them.

 


September 13, 2022, SE-43, Room 215; 4:00 p.m.

Speaker : Sulani Thakshila, Florida Atlantic University
Title : MNTRU Signatures
Abstract : The NTRU cryptosystem is a computational problem introduced in 1996 based  on lattices. Module-NTRU lattices generalize NTRU lattices and possess more benefits on the flexibility of ring dimension. In this talk, I will present Fiat-Shamir signatures based on the inhomogeneous variant of Module-NTRU problem. I will present two signature schemes. The first scheme is a lossy identification scheme secure in the QROM. The second scheme is a BLISS-like signature secure in the classic ROM.


August 31, 2022, SE-43, Room 215; 5:00 p.m.

Speaker : Francesco Sica, Florida Atlantic University
Title : A Note on Torsion Point Attacks
Abstract : A technical lemma is being used in attacks on the supersingular isogeny problem with torsion points (SSI-T) à la Petit, which propagates an error. In this talk, I will explain how Lemma 6 in Petit’s Asiacrypt 2017 paper is incorrect and how this can be fixed to make his attack work in theory as well as in practice.


April 14, 2022, SE-43, Room 215; 10:00 a.m.

Speaker : Emrah Karagoz, Florida Atlantic University
Title : Correlation Power Analysis on AES
Abstract : The main goal of side channel attacks is to gain physical information (such as timing information, power consumption, electromagnetic leaks etc.) from a cryptographic algorithm implemented on a computer device, and to obtain the cryptographic keys by using this information. Power analysis is a type of side channel attack in which the attacker aims to extract the cryptographic keys by studying the power consumption of the device. On the other hand, AES (Advanced Encryption Standard) is a symmetric algorithm standardized by NIST in 2001, and it has been deployed mostly everywhere to encrypt the sensitive data because of its strong cryptographic security. In this presentation, we will explain how correlation power analysis works on AES so that an attacker can extract the AES key very easily, and therefore we will point out that the implementation of a cryptographic algorithm is as important as its cryptographic security.


March 31, 2022, SE-43, Room 215; 10:00 a.m.

Speaker : Tovohery Randrianarisoa, Florida Atlantic University
Title : On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography
Abstract : We define two metrics on vector spaces over a finite field using the linear complexity of finite sequences. We then develop coding theory notions for these metrics and study their properties.  We show how to reduce the problem of finding codewords with given Hamming weight into a problem of finding a vector of a given linear complexity. This implies that our new metric can be used for cryptography in a similar way to what is currently done in the code-based setting with Hamming metric. Recently, Feneuil et al. presented a signature scheme with codes with Hamming metric using a multiparty computation approach. We show that by transforming their work into a setting with linear complexity as metric, we can improve the speed of signing by eliminating all the interpolations steps in the process.


March 17, 2022, SE-43, Room 215; 10:00 a.m.

Speaker : Abhraneel Dutta, Florida Atlantic University
Title : Two Constant Time Polynomial Inversion Algorithms for Post-Quantum Cryptosystems
Abstract : A very common primitive in code-based cryptography is computing the inverse of a binary polynomial over a binary polynomial ring and making such algorithms constant time helps achieve the prevention against timing side channel attacks. This presentation will focus on a brief introduction to two recent time polynomial inversion algorithms which are capable to run in constant time: Bernstein-Yang's "SafeGCD" polynomial inversion, based on the Extended GCD algorithm and constant time Itoh-Tsuji Inversion (ITI) derived from Fermat's Little Theorem.

Video Recording


March 3, 2022, SE-43, Room 215; 10:00 a.m.

Speaker : Edoardo Persichetti, Florida Atlantic University
Title : Code-based Signatures: New Approaches and Research Directions
Abstract : Code-based cryptography is one of the main areas of research within the context of quantum-secure communication. Yet, designing an efficient and secure code-based signature scheme has been a challenging problem for the last few decades. In this talk, I will summarize some of the long history of code-based signatures, and then illustrate current work and future research directions for this important topic.

Video Recording


March 2, 2020, SE-43, Room 215; 4:00 p.m.

Speaker : Roger Wiegand, University of Nebraska
Title : Iterated blowups of two-dimensional regular local rings
Abstract : A major component of the resolution of surface singularities is the blowing up of singular points on the surface.  It turns out that blowing up yields interesting results even when the surface is smooth. In this talk we will discuss two types of blowups, say, A and B.  In either case, we start with a field F and two algebraically independent elements a and b. We write F[a,b]__ for the local ring obtained by inverting the elements of  F[a,b] that are not in the maximal ideal (a,b). Type A replaces the ring F[a,b]__ by the ring F[a,b/a]__ , and type B replaces the ring F[a,b]__ by F[a/b,b]__ .  Suppose we have a sequence of positive integers  [a_0,a_1,a_2,…]. We start with the localized polynomial ring  F[x,y]__ and do A a_0 times, then B a_1 times, then A a_2 times, then B  a_3 times, and so on. This gives an infinite strictly increasing chain of rings, all with the same quotient field  F(x,y). It is known that the union V of these rings is a valuation ring. I will show that the value group of this ring is Z + Zg, where  Z is the additive group of integers and g is the irrational number obtained as the value of the continued fraction represented by the given sequence.  This is joint work with Sylvia Wiegand and was inspired by discussions we had with Karen Smith back in 1996. This work has considerable overlap with Mark Spivakovsky’s Ph.D. thesis and with more recent work by Karen’s Ph.D. students David Bruce, Molly Logue, and Robert Walker.

 


February 24, 2020, SE-43, Room 215; 4:00 p.m.

Speaker: Floyd Johnson, Florida Atlantic University
Title: An Introduction to Quantum Key Distribution
Abstract: Quantum mechanics was one of the greatest scientific breakthroughs of the last century with applications still being found.  Since the 1970’s mathematicians and physicists have been exploring how quantum mechanics can be used in cryptography to achieve previously thought impossible results.  In this talk, we will give an overview of the problem of key establishment and how quantum phenomena can be used to achieve a secure key establishment.

 


February 10, 2020, SE-43, Room 215; 4:00 p.m.

Speaker : Ryann Cartor, Clemson University
Title : All in the C* Family
Abstract : The cryptosystem C*, first proposed and studied by Matsumoto and Imai and introduced in EUROCRYPT '88, is the predecessor of all of the so-called "big field'' schemes of multivariate cryptography.  This scheme has since been broken, which has led to the introduction of modifiers. The introduction of the numerous modifiers of multivariate schemes has produced several variants that stay faithful to the central structure of the original.  From the tumultuous history of C* derivatives, we now see only a very few survivors in the cryptonomy. In this work, we revisit the roots of multivariate cryptography, investigating the viability of C* schemes, in general, under the entire multidimensional array of the principal modifiers.  We reveal that there is a nontrivial space of combinations of modifiers that produce viable schemes resistant to all known attacks. This solution space of seemingly secure C* variants offers trade-offs in multiple dimensions of performance, revealing a family that can be optimized for disparate applications. 

Video Recording


January 27, 2020, SE-43, Room 215; 4:00 p.m.

Speaker : Shaun Miller, Florida Atlantic University
Title : Behavior of a Lattice Basis During Reduction
Abstract : Lattice reduction algorithms aim to produce short, almost orthogonal basis vectors. Theoretical estimates are given for the expected behavior of a basis vector's length during reduction. These estimates will be compared to the lengths obtained experimentally after a brief introduction to the motivation behind lattice-based cryptanalysis. 

 


December 2, 2019, SE-43, Room 215; 4:00 p.m.

Speaker: Paolo Santini, Università Politecnica delle Marche
Title: Reaction attacks on cryptosystems based on codes with sparse parity-checks
Abstract: The concept of sparsity is central in code-based cryptography: hard problems from coding theory are based on the difficulty of finding vectors with a small weight, satisfying some given relations. Furthermore, codes with a sparse representation admit efficient decoding algorithms and seem to be natural candidates for cryptographic schemes. However, currently known decoding techniques are characterized by some failure probability, which can be exploited by an adversary to mount so-called reaction attacks. In this talk, I will speak about Low-Density Parity-Check (LDPC) codes and Low-Rank Parity-Check (LRPC) codes, two families of codes that, despite being defined over different metrics, share many similarities. I will briefly describe how such codes can be decoded, how they can be used to instantiate cryptosystems and how such schemes can be attacked through reaction attacks. 

 


November 18, 2019, SE-43, Room 215; 4:00 p.m.

Speaker : Tran Ngo, Florida Atlantic University
Title : Mersenne Cryptography system
Abstract : In this talk, I will present a cryptosystem based on Mersenne Numbers by Divesh Aggarwal, Antoine Joux, Anupam Prakash, and Miklos Santha in May 2017. The scheme was attacked by [BCGN17] and [dBDJdW17] several months later, and it was reintroduced in November 2017. 

Video Recording


November 4, 2019, SE-43, Room 215; 4:00 p.m.

Speaker: Abhraneel Dutta, Florida Atlantic University
Title: A New Elliptic Curve Scalar Multiplication Algorithm
Abstract: Cryptographic applications of elliptic curve scalar multiplication can be widely seen in the Diffie-Hellman key exchange and elliptic curve digital signature algorithms. I will first review some basic algorithms for scalar multiplication and explain how some of the irregularities in these algorithms can be exploited by side-channel attacks. Second, I will introduce the signed digit representation of scalars and signed aligned column (SAC) encoding algorithms. These algorithms provide some protection against simple power analysis attacks but are limited in the sense that they are based on the binary representation of scalars. In the last part of my talk, I will present our work on the full generalization of signed digit representations and SAC encodings. I will discuss some theoretical results and evaluate them in a cryptographic setting. 

Video Recording


October 21, 2019, SE-43, Room 215; 4:00 p.m.

Speaker : Emrah Karagoz, Florida Atlantic University
Title : Knapsack Problem: Is it Post-Quantum Secure?
Abstract : The Knapsack Problem has been popular in cryptography since the Merkle–Hellman knapsack cryptosystem was announced in 1978, which was one of the first public-key cryptosystems, but had a very short life and was broken in 1982. Although it was discouraged with this failure and beside of the rising popularity of RSA, there are many other proposed algorithms such as the Chor-Rivest Cryptosystem, which are still secure. Even though the Knapsack Problem is an NP-hard problem, and therefore believed to be a good candidate for Post Quantum secure algorithms, there was no submission based on Knapsack Problem in the NIST competition. We are still waiting (or maybe studying)! In this talk, we will discuss the cryptographic aspects of the Knapsack Problem towards the Post-Quantum Secure World. 

Video Recording


October 7, 2019, SE-43, Room 215; 4:00 p.m.

Speaker: Shaun Miller, Florida Atlantic University
Title: A brief introduction to quantum circuits
Abstract: To implement quantum algorithms like Shor's and Grover's, we need to be able to translate classical loops to quantum circuits. I will give an introduction to bra-ket notation as well as quantum circuits. We will use this knowledge to translate a classical while loop into a conditioned quantum loop. 

Video Recording


September 23, 2019, SE-43, Room 215; 4:00 p.m.

Speaker : Edoardo Persichetti, Florida Atlantic University
Title : Research Challenges in Code-Based Cryptography
Abstract : In this talk, I will present the area of code-based cryptography, one of the most active and exciting areas of research within post-quantum cryptography. After a brief introduction, I will discuss some research avenues and open problems. Everyone welcome! 

Video Recording


September 9, 2019, SE-43, Room 215; 4:00 p.m.

Speaker: Shi Bai, Florida Atlantic University
Title: Lattice attacks for variants of LWE
Abstract: The learning with errors (LWE) problem introduced by Regev (STOC'05) is one of the fundamental problems in lattice-based cryptography. It has been used extensively as a security foundation, for public-key encryption, signatures, fully homomorphic encryption (FHE), pseudorandom functions (PRF) and many others. One standard strategy to solve the LWE problem is to reduce it to a unique SVP (uSVP) problem via Kannan's embedding and then apply a lattice reduction to solve the uSVP problem. In this talk, we will discuss and compare various lattice algorithms for solving LWE, and then give some concrete estimates for breaking various variants of LWE (e.g. generic, small secrets, restricted samples). In the end, we will discuss some recent developments on algorithms for solving LWE. 

Video Recording