skip to main content
10.1145/2903150.2907756acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Secure architectures of future emerging cryptography SAFEcrypto

Published: 16 May 2016 Publication History

Abstract

Funded under the European Union's Horizon 2020 research and innovation programme, SAFEcrypto will provide a new generation of practical, robust and physically secure post-quantum cryptographic solutions that ensure long-term security for future ICT systems, services and applications. The project will focus on the remarkably versatile field of Lattice-based cryptography as the source of computational hardness, and will deliver optimised public key security primitives for digital signatures and authentication, as well identity based encryption (IBE) and attribute based encryption (ABE). This will involve algorithmic and design optimisations, and implementations of lattice-based cryptographic schemes addressing cost, energy consumption, performance and physical robustness. As the National Institute of Standards and Technology (NIST) prepares for the transition to a post-quantum cryptographic suite B, urging organisations that build systems and infrastructures that require long-term security to consider this transition in architectural designs; the SAFEcrypto project will provide Proof-of-concept demonstrators of schemes for three practical real-world case studies with long-term security requirements, in the application areas of satellite communications, network security and cloud. The goal is to affirm Lattice-based cryptography as an effective replacement for traditional number-theoretic public-key cryptography, by demonstrating that it can address the needs of resource-constrained embedded applications, such as mobile and battery-operated devices, and of real-time high performance applications for cloud and network management infrastructures.

References

[1]
Peter W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput. 26 (1997), no. 5, 1484--1509.
[2]
L. Chen, S. Jordan, Y. K. Liu, D. Moody, R. Peralta, R. Perlner, D. Smith-Tone, Report on Post-Quantum Cryptography, NISTIR 8105, National Institute of Standards and Technology (NIST), Feb. 2016.
[3]
McEliece, R. J., A Public-Key Cryptosystem Based On Algebraic Coding Theory, DSN Progress Report, 42--44: 114, 1978.
[4]
Niederreiter, H., Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, Problemy Upravlenija i Teorii Informacii 15: 159--166, 1986.
[5]
Merkle, R., Secrecy, authentication and public key systems / A certified digital signature, Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979.
[6]
Patarin, J., The Oil and Vinegar Signature Scheme, Dagstuhl Workshop on Cryptography, 1997.
[7]
Ajtai, M., Generating hard instances of lattice problems (extended abstract), STOC, pp. 99--108, 1996.
[8]
J. Hoffstein, J. Piper and J. H. Silverman, NTRU: A Ring-based Public Key Cryptosystem, In Algorithmic Number Theory, LNCS Vol x, pp267--288, 1998.
[9]
P. Q. Nguyen and O. Regev. Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. J. Cryptology, 22(2):139--160, 2009. (Preliminary version in EUROCRYPT 2006).
[10]
L. Ducas, P. Q. Nguyen, Learning a Zonotype and More: Cryptanalysis of NTRUSign Countermeasures, Advances in Cryptology (ASIACRYPT) 2012, LNCS Vol 7658, pp 433--450, 2012.
[11]
T. Güneysu, V. Lyubashevsky, and T. Pöppelmann, Practical lattice-based cryptography: A signature scheme for embedded systems, CHES, pp. 530--547, 2012.
[12]
Space Missions Key Management Concept, Informational Report, CCSDS 350.6-G-1, Nov. 2011.
[13]
Security Architecture for Space Data Systems, Recommended Practice, CCSDS 351.0-M-1, Nov. 2012.
[14]
Space Data Link Security Protocol, Draft Recomended Standard, CCSDS 355.0-R-3, Oct. 2013.
[15]
Cryptographic Algorithms, Informational Report, CCSDS 350.9-G-1, Dec. 2014.
[16]
National Institute of Standards and Technology (NIST), Recommendation for Key Management - Part 1: General (Revision 3), NIST Special Publication 800-57, July 2012.
[17]
CompTIA, TechAmerica's 24th Annual Federal CIO/CISO Survey Identifies Top 3 Priorities for Government IT Officials, 2014.
[18]
European Commission, Digital Agenda for Europe, at http://ec.europa.eu/digital-agenda/en/open-data-portals
[19]
Bartoli, A. et al., On the Ineffectiveness of Todays Privacy Regulations for Secure Smart City Networks, 2013. at http://www.ict-exalted.eu/publications/deliverables.html
[20]
B. Berteny, LTE Standards for Public Safety-3GPP view, Critical Communications World, May 2013.
[21]
IETF RTCWEB, WebRTC Security Architecture, March 2015.
[22]
Security of Multimedia Broadcast/Multicast Service (MBMS), ETSI, at http://www.etsi.org/deliver/etsi-ts/133200-133299/133246/10.01.00-60/ts-133246v100100p.pdf.
[23]
T. Hardjono et al., The Multicast Group Security Architecture, IETF RFC 3740, March 2004.
[24]
Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM), ETSI, at http://www.etsi.org/deliver/etsi-ts/102400-102499/102466/01.01.01-60/ts-102466v010101p.pdf
[25]
www.safecrypto.eu/
[26]
M. Ajtai and C. Dwork, A Public Key Cryptosystem with Worst-case/Average-Case equivalence, ACS STOC, pp 284--293, 1997.
[27]
O. Goldreich, S. Goldwasser and S. Halevi, Public Key Encryption from Lattice Reduction Problems, Crypto '97, pp 112--131, 1997.
[28]
P. Q. Nguyen, Cryptanalysis of the Goldreich Goldwasser Halevi Cryptosystem from CRYPTO '97, CRYPTO '99, pp 288--304, 1999.
[29]
O. Regev, On Lattices, Learning With Errors, Random Linear Codes, and Cryptography, STOC, 2005.
[30]
J. Howe, C. Moore, M. O'Neill, F. Regazzoni, T. Güneysu, K. Beeden, Lattice-based Encryption Over Standard Lattices in Hardware, accepted at 53 Design Automation Conference (DAC), Austin, Texas, June 5--9 2016.
[31]
V. Lyubashevsky, C. Peikert, and O. Regev. On ideal lattices and learning with errors over rings. In EUROCRYPT, pages 1--23, 2010.
[32]
T. Pöppelmann, L. Ducas, and T. Güneysu, Enhanced Lattice-based Signatures on Reconfigurable Hardware, CHES 2015, 353--370, 2015.
[33]
L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, Lattice signatures and bimodal Gaussians, CRYPTO 2013, 2013.
[34]
S. Bai and S. Galbraith, An improved compression technique for signatures based on learning with errors, Topics in Cryptology- CT-RSA 2014, vol. 8366 of LNCS, pp 28--47, Springer, 2014.
[35]
C. Peikert, An Efficient and Parallel Gaussian Sampler for Lattices, CRYPTO 2010, 2010.
[36]
N. Dwarakanath and S. Galbraith, Sampling from discrete Gaussians for lattice-based cryptography on a constrained device, App. Algebra Eng. Commun. Comput. 25(3): 159--180, 2014.
[37]
J. Buchmann, D. Cabarcas, F. Göpfert, A. Hülsing, and P. Weiden, Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers, SAC 2013, 402--417, 2013.
[38]
L. Ducas, V. Lyubashevsky, and T. Prest. Efficient identity-based encryption over NTRU lattices, ASIACRYPT 2014.
[39]
S. Gorbunov, V. Vaikuntanathan, H. Wee, Attribute-based encryption for circuits. STOC 2013.
[40]
https://www.openswan.org/
[41]
https://github.com/mjosaarinen/hilabliss
[42]
J. W. Bos, C. Costello, M. Naehrig, and D. Stebila, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, Cryptology ePrint Archive, Report 2014/599, 2014.
[43]
E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, Post-quantum key exchange - a new hope, Cryptology ePrint Archive, Report 2015/1092, 2015.
[44]
E. Alkim, N. Bindel, J. Buchmann, and O. Dagdelen. Tesla, Tightly-secure efficient signatures from standard lattices, Cryptology ePrint Archive, Report 2015/755, 2015.
[45]
D. J. Bernstein und P. Schwabe, NEON crypto, Bd. 7428, Springer-Verlag Berlin Heidelberg, pp. 320--339.
[46]
M. J. Saarinen, Gaussian Sampling Precision in Lattice Cryptography, Cryptology ePrint Archive, Report 2015/953, 2015.
[47]
M. J. Saarinen, Arithmetic Coding and Blinding for Lattice Cryptography, Cryptology ePrint Archive, Report 2016/276, 2016.
[48]
P. C. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. In M. J. Weiner, editor, Advances in Cryptology, CRYPTO 1999, vol. 1666 of LNCS, pp 388--397.
[49]
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar und M. Salmasizadeh, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, 2008.
[50]
Daniel J. Bernstein, Cache-timing attacks on AES, 2005, http://cr.yp.to/antiforgery/cachetiming-20050414.pdf.
[51]
Dag A. Osvik, Adi Shamir, and Eram Tromer, Cache Attacks and Countermeasures: The Case of AES, Topics in Cryptology - CT-RSA 2006.
[52]
O. Acäśicmez, J. P. Seifert, and C. K. Koc, Predicting Secret Keys via Branch Prediction, Topics in Cryptology-CT-RSA (2007).
[53]
S. Mangard, E. Oswald und T. Popp, Power Analysis Attacks: Revealing the Secrets of Smartcards, Springer-Verlag, 2007.
[54]
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi, Template attacks, CHES 2002, 2002, pp. 13--28.
[55]
Werner Schindler, Kerstin Lemke, and Christof Paar, A stochastic model for differential side channel cryptanalysis, CHES 2005 (Josyula R. Rao and Berk Sunar, eds.), Lecture Notes in Computer Science, vol. 3659, Springer, 2005.
[56]
F. X. Standaert, T. G. Malkin and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version), Cryptology ePrint Archive, Report 2006/139, April 2006.
[57]
P. N. Fahn, P. K. Pearson, IPA: A new class of power attacks, Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 1999.
[58]
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures Proceedings of the IEEE 100(11): 3056--3076, 2012.
[59]
E. Tromer, D. Osvik, and A. Shamir, Efficient cache attacks on AES, and countermeasures, Journal of Cryptology 23, no. 1 (2010): 37--71, 2010.
[60]
K. Tiri and I. Verbauwhede, A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation, In Proceedings of the conference on Design, automation and test in Europe-Volume 1 p. 10246). IEEE Computer Society, 2004.
[61]
S. Chari, C. Jutla, J. Rao, and P. Rohatgi, Towards sound approaches to counteract power-analysis attacks, In Advances in Cryptology (CRYPTO 1999). Lecture Notes in Computer Science, Vol. 1666, pp. 398--412. Springer, 1999.
[62]
G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, Computers, IEEE Transactions on 52, no. 4 (2003): 492--505, 2003.
[63]
O. Reparaz, S. Roy, F. Vercauteren, and I. Verbauwhede, A masked ring-LWE implementation, In Cryptographic Hardware and Embedded Systems--CHES 2015, pp. 683--702. Springer Berlin Heidelberg, 2015.

Cited By

View all
  • (2025)PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networksAd Hoc Networks10.1016/j.adhoc.2024.103645166(103645)Online publication date: Jan-2025
  • (2023)Random Routing Algorithm for Enhancing the Cybersecurity of LEO Satellite NetworksElectronics10.3390/electronics1203051812:3(518)Online publication date: 19-Jan-2023
  • (2022)Integration of Quantum Computing and Blockchain Technology: A Cryptographic PerspectiveMultimedia Technologies in the Internet of Things Environment, Volume 310.1007/978-981-19-0924-5_12(197-228)Online publication date: 5-Apr-2022
  • Show More Cited By
  1. Secure architectures of future emerging cryptography SAFEcrypto

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CF '16: Proceedings of the ACM International Conference on Computing Frontiers
    May 2016
    487 pages
    ISBN:9781450341288
    DOI:10.1145/2903150
    • General Chairs:
    • Gianluca Palermo,
    • John Feo,
    • Program Chairs:
    • Antonino Tumeo,
    • Hubertus Franke
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 May 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SAFEcrypto
    2. attribute based encryption
    3. digital signatures
    4. identity based encryption
    5. key exchange
    6. lattice based cryptography
    7. post quantum cryptography

    Qualifiers

    • Research-article

    Funding Sources

    • European Union Horizon 2020

    Conference

    CF'16
    Sponsor:
    CF'16: Computing Frontiers Conference
    May 16 - 19, 2016
    Como, Italy

    Acceptance Rates

    CF '16 Paper Acceptance Rate 30 of 94 submissions, 32%;
    Overall Acceptance Rate 273 of 785 submissions, 35%

    Upcoming Conference

    CF '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networksAd Hoc Networks10.1016/j.adhoc.2024.103645166(103645)Online publication date: Jan-2025
    • (2023)Random Routing Algorithm for Enhancing the Cybersecurity of LEO Satellite NetworksElectronics10.3390/electronics1203051812:3(518)Online publication date: 19-Jan-2023
    • (2022)Integration of Quantum Computing and Blockchain Technology: A Cryptographic PerspectiveMultimedia Technologies in the Internet of Things Environment, Volume 310.1007/978-981-19-0924-5_12(197-228)Online publication date: 5-Apr-2022
    • (2020)Mitigating distributed denial of service attacks in satellite networksTransactions on Emerging Telecommunications Technologies10.1002/ett.393631:6Online publication date: 9-Mar-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media