ISG

group_project

Visible to the public CT-ISG: Crypto Algorithms for an Integrated Approach to Conditional, Revocable and Traceable Anonymity

As records of individuals' activities become increasingly computerized and linked, privacy becomes an ever more challenging problem. It is especially challenging when legitimate security needs require the ability to link different transactions and even obtain details about the individuals involved. The focus of this project is on cryptographic technologies that achieve a compromise: transaction records should be anonymous until special circumstances (such as wrong-doing on the part of a particular individual, or an emergency that requires special measures) arise.

group_project

Visible to the public CT-ISG: On Imperfect Randomness and Exposure-Resilient Cryptography

Randomization has proved to be a vital part in building essentially any kind of secure cryptographic system: secret keys should be randomly generated and most cryptographic primitives, such as encryption, must be probabilistic. As a common abstraction, it is typically assumed that ideal randomness is available to all the participants of the system. In many situations, this assumption is highly unrealistic, and cryptographic systems have to be built based on *imperfect* sources of randomness.

group_project

Visible to the public CT-ISG: Collaborative Research: Fault Tolerance in Crypto Hardware via Dynamic Assertion Checking

Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.

group_project

Visible to the public CT-ISG: Collaborative Research: Key Generation from Physical Layer Characteristics in Wireless Networks

This project focuses on the development of a new class of secret key generation and renewal algorithms for securing wireless networks by taking advantage of physical layer characteristics. The basis of the approach is the identification of measurable quantities of the wireless channel between a pair of nodes that are highly correlated exclusively between them (albeit not identical).

group_project

Visible to the public CT-ISG: Collaborative Research: Tamper Proofing Cryptographic Operations

This research project focuses on the development of cryptographic mathematical models and constructions that address realistic security requirements at the implementation level. This is a fundamental problem as cryptographic security formalisms are often criticized for lack of relevance given the wide range of attacks available at the implementation level.

group_project

Visible to the public CT-ISG Collaborative Research: Trusted Cooperative Transmission: Turning a Security Weakness into a Security Enhancement

Cooperative transmission is an emerging wireless communication paradigm that improves wireless channel capacity by creating multi-user cooperation in the physical layer. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overheard this transmission will "help" the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality.

group_project

Visible to the public CT-ISG: Collaborative Research: Fault Tolerance in Crypto Hardware via Dynamic Assertion Checking

Secure applications require trustworthy hardware for successful deployment. A trustworthy hardware device (e.g., a smart card) should maintain its security properties even against efforts at probing and reverse engineering; moreover, sensitive data stored on a trustworthy hardware device should be protected at all times. Side-channels attacks are used to learn the secrets stored by a device through monitoring the side effects of its computation. The well known power side-channel attack uses the effect that a cryptographic key has on the power waveform as the cipher runs.

group_project

Visible to the public CT-ISG: Collaborative Research: Router Models and Downscaling Tools for Scalable Security Experiments

It is critical to protect the Internet from attacks such as denial of service, and attacks on inter-domain routing. Although several defenses have been proposed, actual deployments have been limited. A primary reason for this lack of deployment is that most defenses have not been validated under realistic conditions, or at sufficiently large scales. Many attacks also have second-order effects that are not well understood. This is because it is difficult to incorporate all the protocols involved at any reasonable scale in analytical, simulation, or emulation models or testbeds.

group_project

Visible to the public CT-ISG: Usable Cyber Trust Indicators

When systems rely on a "human in the loop" to carry out a security-critical function, cyber trust indicators are often employed to communicate when and how to perform that function. Indicators typically serve as warnings or status indicators that communicate information, remind users of information previously communicated, and influence behavior. They include a variety of security- and privacy-related symbols in the operating system status bar or browser chrome, pop-up alerts, security control panels, or symbols embedded in web content.

group_project

Visible to the public CT-ISG: Traffic Analysis: Attacks, Defenses, and Fundamental Limits

This project concerns traffic analysis--the practice of learning sensitive information from communication patterns, rather than their contents. As encryption of data becomes more prevalent, a detailed study of traffic analysis is necessary to understand the threats to privacy that patterns of communication pose, and to design effective countermeasures. Traffic analysis is also important for intrusion detection, to detect attacks and abnormalities that are embedded in encrypted traffic.