April 14, 2022, SE-43, Room 215; 10:00 a.m.
Speaker : Emrah Karagoz, Florida Atlantic University
Title : Correlation Power Analysis on AES
Abstract : The main goal of side channel attacks is to gain physical information (such as timing information, power consumption, electromagnetic leaks etc.) from a cryptographic algorithm implemented on a computer device, and to obtain the cryptographic keys by using this information. Power analysis is a type of side channel attack in which the attacker aims to extract the cryptographic keys by studying the power consumption of the device. On the other hand, AES (Advanced Encryption Standard) is a symmetric algorithm standardized by NIST in 2001, and it has been deployed mostly everywhere to encrypt the sensitive data because of its strong cryptographic security. In this presentation, we will explain how correlation power analysis works on AES so that an attacker can extract the AES key very easily, and therefore we will point out that the implementation of a cryptographic algorithm is as important as its cryptographic security.
March 31, 2022, SE-43, Room 215; 10:00 a.m.
Speaker : Tovohery Randrianarisoa, Florida Atlantic University
Title : On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography
Abstract : We define two metrics on vector spaces over a finite field using the linear complexity of finite sequences. We then develop coding theory notions for these metrics and study their properties. We show how to reduce the problem of finding codewords with given Hamming weight into a problem of finding a vector of a given linear complexity. This implies that our new metric can be used for cryptography in a similar way to what is currently done in the code-based setting with Hamming metric. Recently, Feneuil et al. presented a signature scheme with codes with Hamming metric using a multiparty computation approach. We show that by transforming their work into a setting with linear complexity as metric, we can improve the speed of signing by eliminating all the interpolations steps in the process.
March 17, 2022, SE-43, Room 215; 10:00 a.m.
Speaker : Abhraneel Dutta, Florida Atlantic University
Title : Two Constant Time Polynomial Inversion Algorithms for Post-Quantum Cryptosystems
Abstract : A very common primitive in code-based cryptography is computing the inverse of a binary polynomial over a binary polynomial ring and making such algorithms constant time helps achieve the prevention against timing side channel attacks. This presentation will focus on a brief introduction to two recent time polynomial inversion algorithms which are capable to run in constant time: Bernstein-Yang's "SafeGCD" polynomial inversion, based on the Extended GCD algorithm and constant time Itoh-Tsuji Inversion (ITI) derived from Fermat's Little Theorem.
March 3, 2022, SE-43, Room 215; 10:00 a.m.
Speaker : Edoardo Persichetti, Florida Atlantic University
Title : Code-based Signatures: New Approaches and Research Directions
Abstract : Code-based cryptography is one of the main areas of research within the context of quantum-secure communication. Yet, designing an efficient and secure code-based signature scheme has been a challenging problem for the last few decades. In this talk, I will summarize some of the long history of code-based signatures, and then illustrate current work and future research directions for this important topic.