Cryptography, applied

group_project

Visible to the public STARSS: Small: Trapdoor Computational Fuzzy Extractors

Fuzzy extractors convert biometric data into reproducible uniform random strings, and make it possible to apply cryptographic techniques for biometric security. They are used to encrypt and authenticate user data with keys derived from biometric inputs. This research investigates how hardware security primitives can have provable cryptographic properties, a connection which is largely lacking in currently available hardware primitives.

group_project

Visible to the public TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation

Secure computation allows users to collaboratively compute any program on their private data, while ensuring that they learn nothing beyond the output of the computation. Existing protocols for secure computation primarily rely on a boolean-circuit representation for the program being evaluated, which can be highly inefficient. This project focuses on developing secure-computation protocols in the RAM model of computation. Particularly challenging here is the need to ensure that memory accesses are oblivious, and do not leak information about private data.

group_project

Visible to the public  TWC: Medium: Designing Strongly Obfuscated Hardware with Quantifiable Security against Reverse Engineering

Our world has become increasingly reliant on integrated circuits (ICs). Mobile phones are deeply enmeshed in our everyday lives, we drive cars equipped with hundreds of ICs, and have come to depend on the power grid and other cyber physical systems that are controlled by ICs. Not surprisingly, the issue of securing hardware has become increasingly vital. A reverse engineering adversary may, for example, be motivated by extracting intellectual property from a circuit, cloning a design for product piracy, or creating a targeted backdoor for stealing cryptographic keys.

group_project

Visible to the public NSFSaTC-BSF: TWC: Small: Horizons of Symmetric-Key Cryptography

Symmetric-key primitives are the lifeblood of practical cryptography, and are critical components of nearly any computer security system. The cryptographic community has developed a rich body of work on theoretically sound symmetric objects, but they are many orders of magnitude too slow for realistic usage. Thus, practitioners use fast primitives that have been designed to withstand known attacks, but which lack rigorous security guarantees based on natural mathematical problems.

group_project

Visible to the public TWC: Medium: Apollo: An Architecture for Scalable Verifiable Computing

Cloud computing enables computationally limited parties to outsource the storage of, and computation on, massive amounts of data. Such outsourced computations, however, might be performed incorrectly, due to implementation errors or malicious behavior. Protocols for verifiable computation allow an untrusted server performing such computations to also provide succinct proofs that the returned results are correct.

group_project

Visible to the public TWC: Small: Secure by Construction: An Automated Approach to Comprehensive Side Channel Resistance

A software implementation shows side-channel leakage when the physical effects of its implementation have a dependency to secret data such as cryptographic keys. Relevant physical effects include instruction execution time, memory access time, power consumption and electromagnetic radiation. Fifteen years after differential power analysis was first demonstrated, side-channel attacks are affecting software implementations in a broad variety of processors. Yet, without the support of automatic tools, programmers still have to resort to manual and error-prone insertion of countermeasures.

group_project

Visible to the public TWC: Medium: Collaborative: Broker Leads for Privacy-Preserving Discovery in Health Information Exchange

Support for research on distributed data sets is challenged by stakeholder requirements limiting sharing. Researchers need early stage access to determine whether data sets are likely to contain the data they need. The Broker Leads project is developing privacy-enhancing technologies adapted to this discovery phase of data-driven research. Its approach is inspired by health information exchanges that are based on a broker system where data are held by healthcare providers and collected in distributed queries managed by the broker.

group_project

Visible to the public SaTC: Hardware-Assisted Methods for Operating System Integrity

Operating systems (OS) form the core of the trusted computing base on most computer platforms. The security of a platform therefore crucially relies on the correct and secure operation of its OS. Unfortunately, malicious software such as rootkits infect the OS by compromising the integrity of its code and data, thereby jeopardizing the security of the entire platform.

group_project

Visible to the public TWC: Medium: Collaborative: Development and Evaluation of Next Generation Homomorphic Encryption Schemes

Fully homomorphic encryption (FHE) is a promising new technology that enables an untrusted party to efficiently compute directly on ciphertexts. For instance, with FHE a cloud server without access to the user's encrypted content can still provide text search services. An efficient FHE scheme would significantly improve the security of sensitive user data stored and processed on cloud servers. Significant progress has been made in bringing FHE proposals closer to practice.

group_project

Visible to the public SaTC-EDU: EAGER Enhancing Cybersecurity Education Through a Representational Fluency Model

Cybersecurity experts must possess several abilities: deep technical skills, the capability to recognize and respond to complex and emergent behavior, mastery of using abstractions and principles, the ability to assess risk and handle uncertainty, problem-solving and reasoning skills, and facility in adversarial thinking. Based on cognitive theory, this project will investigate the efficacy of model eliciting activities for developing students' ability to recognize and respond to complex and emergent behavior, and how to handle uncertainty and ambiguity.