Research
The Chair for Embedded Security is interested in all aspects of cryptography and security in “devices”, e.g., handhelds such as the iPod or Blackberry, smart cards, RFID tags but also larger systems like cars. Our research can be divided in the following general areas:
- Implementation attacks
- Security analysis of real-world systems
- High-speed cryptography
- Emerging embedded security applications (GPS, cars, …)
Implementation Attacks
Since the late 1990s it has become obvious that it is not sufficient that a cryptographic algorithm is merely mathematically secure. It is often fairly easy to break (i.e., to extract secret keys) crypto applications using physical attacks, for instance by monitoring the power consumption of a smart card, or by injecting faults via the power supply. Our work deals with the theory and experimental realization of implementation attacks, including passive side channel attacks and fault injection attacks. Representative publications include:
- Timo Kasper, David Oswald, Christof Paar, "New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs". RFIDSec 2009.
- Kerstin Lemke-Rust, Christof Paar, "Gaussian Mixture Models for Higher-Order Side Channel Analysis". CHES 2007.
Security analysis of real-world systems
In order to design a highly secure system, it is indispensable that an application is investigated with respect to vulnerabilities. Hence, attempting to “break” a system is an important part of modern security engineering. We systematically research whether real-world systems can be broken, and with which effort. The methods we use include implementation attacks as well as classical cryptanalysis. The lessons we learn from those investigate greatly help to improve further products and systems. Representative publications include:
- Thomas Eisenbarth, Timo Kasper, Amir Morai, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, "On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme". CRYPTO 2008. Santa Barbara, USA.
- Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar, "E-Passport: Cracking Basic Access Control Keys with Copacobana". SHARCS Workshop 2007, Vienna, Austria.
High-speed cryptography
Highly efficient implementations of crypto algorithms are often required in practice, for instance in high-speed computer networks or in mobile networks with tight real-time requirements (e.g., for car2car communication). Because public-key algorithms such as RSA or elliptic curves are extremely arithmetic intensive, high performance implementations are a challenging research problem. In addition to widely used ciphers, we also investigate the implementation properties of future algorithms, e.g., hyperelliptic curves or post-quantum cryptography.
One focus of our research is on hardware architectures for symmetric and public-key algorithms. In addition to computer architectures for ASICs, we have extensive research efforts related to FPGAs and crypto algorithms. The other focus is on high-speed realizations in software. In addition to general-purpose CPUs (e.g., from Intel or AMD), we also investigate crypto algorithms on “unconventional” processors such as graphic cards (GPUs) or the Cell Processor which can be found in Sony’s PlayStation. Representative publications include:
- Robert Szerwinski, Tim Güneysu, "Exploiting the Power of GPUs for Asymmetric Cryptography".CHES 2008, Washington, USA.
- Tim Güneysu, Christof Paar, "Ultra High Performance ECC over NIST Primes on Commercial FPGAs". CHES 2008, Washington, USA.
Emerging embedded security applications
In the past, the use of cryptography and security was mainly confined to specific applications such as banking or government communication. Nowadays, due to the advent of ubiquitous computing, many, many new applications and systems have security needs. Examples include cars, medical devices or heavy machinery. We research security for such applications from a systems level and from a crypto-algorithm level. We have major efforts in the area of IT security in cars. For instance, in 2003 we started the conference series escar – Embedded Security in Cars. Representative publications include:
- Marko Wolf, "Security Engineering for Vehicular Systems -- Improving Trustworthiness and Dependability of Automotive IT Applications", Dissertation, Ruhr-Universität-Bochum, Deutschland, April 2008.
- Kerstin Lemke, Christof Paar, Marko Wolf (Eds.), "Embedded Security in Cars", Springer Monograph Series, 2006.