Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision |
public:research:main [2024-01-18 12:22] – [Cryptanalysis of elliptic curves and other algebraic methods] x451866 | public:research:main [2024-01-18 15:50] – [Randomness statistical testing of TRNG and PRNG] xjancar |
---|
We systematically analyze the security of cryptographic implementations, including the blackbox ones with no access to a source code (e.g., cryptographic smartcards). Typically, a large number of cryptographic operations is executed with observed data and various side-channel information recorded and statistically analyzed. The approach leads to several high-profile discoveries, including the practical factorization of RSA keys from Infineon chips ([[https://roca.crocs.fi.muni.cz/|ROCA attack CVE-2017-15361]]) or EC private key extraction from timing of ECDSA signatures ([[https://minerva.crocs.fi.muni.cz/|Minerva attack CVE-2019-15809]]). The goal is not only to find an attack but also to provide open-source verification tools. | We systematically analyze the security of cryptographic implementations, including the blackbox ones with no access to a source code (e.g., cryptographic smartcards). Typically, a large number of cryptographic operations is executed with observed data and various side-channel information recorded and statistically analyzed. The approach leads to several high-profile discoveries, including the practical factorization of RSA keys from Infineon chips ([[https://roca.crocs.fi.muni.cz/|ROCA attack CVE-2017-15361]]) or EC private key extraction from timing of ECDSA signatures ([[https://minerva.crocs.fi.muni.cz/|Minerva attack CVE-2019-15809]]). The goal is not only to find an attack but also to provide open-source verification tools. |
| |
<button collapse="cryptoimplementations">Find out more</button> | <button icon="fa fa-caret-down" collapse="cryptoimplementations">Find out more</button> |
<button icon="fa fa-file-text-o">[[:publications:keywords:cryptoimplementations|Publications]]</button> | <button icon="fa fa-file-text-o">[[:publications:keywords:cryptoimplementations|Publications]]</button> |
| |
We also develop tools and libraries helping open-source developers to create open, faster, and more secure JavaCard applets. | We also develop tools and libraries helping open-source developers to create open, faster, and more secure JavaCard applets. |
| |
<button collapse="smartcards">Find out more</button> | <button icon="fa fa-caret-down" collapse="smartcards">Find out more</button> |
<button icon="fa fa-file-text-o">[[:publications:keywords:smartcards|Publications]]</button> | <button icon="fa fa-file-text-o">[[:publications:keywords:smartcards|Publications]]</button> |
| |
<collapse id="smartcards" collapsed="true"> | <collapse id="smartcards" collapsed="true"> |
===== Cryptanalysis of elliptic curves and other algebraic methods ===== | ===== Cryptanalysis of elliptic curves and other algebraic methods ===== |
| |
{{ :public:research:std.png?nolink&200|}} | {{ :public:research:curves.png?nolink&120|}} |
| |
Likely the most theoretical and math-heavy research we do, though still with real-world consequences in mind. We approach elliptic curves from many different directions: we study ECC implementations, problems with ECC formulas, ECC key datasets and in general diverse mathematical ideas involving elliptic curves. Sometimes, this requires us to dive into lattice methods as well. | Likely the most theoretical and math-heavy research we do, though still with real-world consequences in mind. We approach elliptic curves from many different directions: we study ECC implementations, problems with ECC formulas, ECC key datasets and in general diverse mathematical ideas involving elliptic curves. Sometimes, this requires us to dive into lattice methods as well. |
In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol. | In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol. |
| |
<button collapse="ecc">Find out more</button> | <button icon="fa fa-caret-down" collapse="ecc">Find out more</button> |
<button icon="fa fa-file-text-o">[[:publications:keywords:ecc|Publications]]</button> | <button icon="fa fa-file-text-o">[[:publications:keywords:ecc|Publications]]</button> |
| |
| |
| |
<button collapse="randomness">Find out more</button> | <button icon="fa fa-caret-down" collapse="randomness">Find out more</button> |
<button icon="fa fa-file-text-o">[[:publications:keywords:randomness|Publications]]</button> | <button icon="fa fa-file-text-o">[[:publications:keywords:randomness|Publications]]</button> |
| |