img
img

News

img

September 2016 ‒ NATO Workshop on PQC

Koç is a speaker at the NATO Workshop on Secure Implementation of PQC, held at Tel Aviv University on Sep 26-27. His talk title: Hardware Trojans in Incompletely Specified Digital Systems. URL

img

August 2016 ‒ FDTC 2016 Keynote

Koç is a keynote speaker at Fault Diagnosis and Tolerance in Cryptography, held in Santa Barbara on Aug 16. He will cover continuous-time computational aspects of cyber-physical security. URL

img

May 2016 ‒ CryptArchi 2016

"Light-weight FPGA Implementation of FIPS140-2 Online Statistical Tests", authored by Çiçek, Parlak, and Koç, is accepted by CryptArchi 2016. URL

img

May 2016 ‒ Cryptographic Engineering 6/2

Journal of Cryptographic Engineering (JCEN) is the the official journal of the Cryptographic Hardware and Embedded Systems (CHES) community. Koç is the founding editor-in-chief of JCEN. 2016/2

img

Mar 2016 ‒ Associate Editor of IJFCS

Koç has accepted to serve as an Associate Editor of the prestigious International Journal of Foundations of Computer Science. URL

img

Oct 2015 ‒ NSF Funding

NSF has awarded funding to Tim Cheng and Çetin Kaya Koç to develop new methods of preventing and detecting hardware Trojans. See NSF Page and the Project Page.

Our Research Goals

Cryptography provides techniques, mechanisms, and tools for private and authenticated communication, and for performing secure and authenticated transactions over the Internet as well as other open networks. It is highly probable that each bit of information flowing through our networks will have to be either encrypted and decrypted or signed and authenticated in the near future. In such an environment, server and client computers as well as handheld, portable, and wireless devices will have to be capable of encrypting or decrypting and signing or verifying messages. Without exception, all networked computers and devices must have cryptographic layers implemented, and must be able to access to cryptographic functions in order to provide security features. In this context, efficient (in terms of time, area, and power consumption) hardware structures will have to be designed, implemented, and deployed. Furthermore, general-purpose (platform-independent) as well as special-purpose software implementing cryptographic functions on embedded devices are needed. An additional challenge is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels.

Projects

Electronic Voting

Whether someone is an expatriate, military, impaired, or simply busy, we want to maximize the number of engaged eligible voters and minimize election cost and complexity for election officials. Additionally, election security is just as important as reducing cost and complexity. Our internet voting research is focused on building secure affordable voting systems.

More

Cyber-Physical Security

Cell phones, medical devices, payment systems, vehicles, and control systems generally, are increasingly being targeted by hackers. As integrated circuit costs decrease, intelligence devices and systems will become even more pervasive and complex. In order to prevent future attacks, we perform fundamental research in the secure design of these systems.

More

Cryptographic Hardware and Embedded Systems

There are some significant challenges in high-speed, small-space (circuit size or code space) implementations of public-key cryptographic algorithms. An additional difficulty is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels. Our particular research and development areas are quite diverse and include architectures, side-channel analysis and countermeasures, and cryptographic processors and co-processors.

More

Elliptic Curve Cryptography and Finite Fields

Elliptic curve cryptography provides a general methodology for obtaining high-speed, efficient, and scalable implementations of cryptographically strong random number generators, public-key cryptographic and network security protocols. We develop algorithms, hardware and software realizations of elliptic curve cryptographic primitives.

More

Deterministic, Hybrid and True Random Number Generators

The security of modern cryptography relies on the quality of random numbers, used as secret keys, private keys, and ephemeral and initializing variables. We are working on new methods of building random number generators that are cryptographically strong however requiring minimal resources in terms of speed, space and power.

More