project . 2017 - 2024 . On going

SEAL

Sound and Early Assessment of Leakage for Embedded Software
Open Access mandate for Publications European Commission
  • Funder: European CommissionProject code: 725042 Call for proposal: ERC-2016-COG
  • Funded under: H2020 | ERC | ERC-COG Overall Budget: 1,947,000 EURFunder Contribution: 1,947,000 EUR
  • Status: On going
  • Start Date
    01 Sep 2017
    End Date
    29 Feb 2024
  • Detailed project information (CORDIS)
  • Open Access mandate
    Research Data: No
Description
Side channel attacks use, alongside information such as plaintexts or ciphertexts, leakage about the (secret) key-dependent intermediate state(s), and deliver a `key ranking' as a result. Kocher's attacks [15] [16] showed that for many practical implementations, observing a few encryptions made complete key recovery possible in practice. The academic research into combating these attacks so far has largely focused on approaches and tools to equip specialised cryptographic engineers with access to a specialist lab and tools. The research hypothesis of this CoG is that one can make meaningful statements about the leakage behaviour of arbitrary implementations on s...
Description
Side channel attacks use, alongside information such as plaintexts or ciphertexts, leakage about the (secret) key-dependent intermediate state(s), and deliver a `key ranking' as a result. Kocher's attacks [15] [16] showed that for many practical implementations, observing a few encryptions made complete key recovery possible in practice. The academic research into combating these attacks so far has largely focused on approaches and tools to equip specialised cryptographic engineers with access to a specialist lab and tools. The research hypothesis of this CoG is that one can make meaningful statements about the leakage behaviour of arbitrary implementations on s...
Any information missing or wrong?Report an Issue