Sommaire

  • Cet exposé a été présenté le 12 décembre 2014.

Description

  • Orateur

    Sven Muelich - Institute of Communications Engineering, Ulm University

Cryptographic applications require random, unique and unpredictable keys. Since most cryptosystems need to access the key several times, it usually has to be stored permanently. This is a potential vulnerability regarding security, even if a protected memory is used as key storage. Implementing secure key generation and storage is therefore an important and challenging task which can be accomplished by Physical Unclonable Funtions (PUFs). PUFs are, typically digital, circuits that possess an intrinsic random- ness due to process variations which occur during manufacturing. They evaluate these variations and can therefore be used to generate secure cryptographic keys. It is not necessary to store these keys in a protected memory since they are implicitly stored in the PUF and can be repro- duced on demand. However, the results when reproducing a key vary, which can be interpreted as errors. Thus, error correction must be used in order to compensate this effect. We explain how methods from coding theory are applied in order to ensure reliable key reproduction. Previous work on this topic used stan- dard constructions, e.g. an ordinary concatenated scheme of a BCH and Repetition code. Based on this work we show how better results can be obtained using code classes and decoding principles not used for this sce- nario before. We exemplify these methods by specific code constructions which improve existing codes with respect to error probability, decoding complexity and codeword length. Examples based on Generalized Con- catenated, Reed-Muller and Reed-Solomon codes are given.

Prochains exposés

  • SoK: Security of the Ascon Modes

    • 20 juin 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Charlotte Lefevre - Radboud University

    The Ascon authenticated encryption scheme and hash function of Dobraunig et al (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE) resembles ideas of SpongeWrap, but not quite, and various works have investigated the generic security of Ascon-AE, all covering different attack[…]
  • Comprehensive Modelling of Power Noise via Gaussian Processes with Applications to True Random Number Generators

    • 27 juin 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Maciej Skorski - Laboratoire Hubert Curien

    The talk examines power noise modelling through Gaussian Processes for secure True Random Number Generators.   While revisiting one-sided fractional Brownian motion, we obtain novel contributions by quantifying posterior uncertainty in exact analytical form, establishing quasi-stationary properties, and developing rigorous time-frequency analysis. These results are applied to model oscillator[…]
    • Cryptography

    • TRNG

  • CryptoVerif: a computationally-sound security protocol verifier

    • 05 septembre 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Bruno Blanchet - Inria

    CryptoVerif is a security protocol verifier sound in the computational model of cryptography. It produces proofs by sequences of games, like those done manually by cryptographers. It has an automatic proof strategy and can also be guided by the user. It provides a generic method for specifying security assumptions on many cryptographic primitives, and can prove secrecy, authentication, and[…]
    • Cryptography

Voir les exposés passés