img
img

News

img

Jul 2017 ‒ CPSEd Workshop

The Cyber-Physical Security Education Workshop will be held in July 17-19, 2017 in Paris.

img

Dec 2016 ‒ ITMO University

Koç will visit the SCA Research Lab of the ITMO University in Saint Petersburg, Russia.

img

Nov 2016 ‒ IEEE TCAD Paper

"Hiding hardware Trojan channels in partially specified SoC bus functionality" by Fern, San, Koç, & Cheng. PDF

img

Nov 2016 ‒ IEEE TC Paper

"Area-time Efficient Architecture of FFT-based Montgomery Multiplication" by Dai, Chen, Cheung and Koç. PDF

img

Nov 2016 ‒ IEEE TC Special Section on PQC

Koç, Longa and Liu are the Guest Editors of Cryptographic Engineering in a Post-Quantum World. CFP

img

Nov 2016 ‒ Cryptographic Engineering 2016/4

JCEN covers techniques, tools, and applications of research in cryptography. Koç is the founding editor-in-chief. URL

img

October 2015 ‒ NSF Funding

NSF has awarded funding to Cheng and Koç for developing methods to prevent and detect hardware Trojans. NSF Page

img

Jul 2016 ‒ NSF Funding

NSF has awarded funding to Koç for developing Cyber-Physical Security Education Workshop. NSF Page

Our Research Goals

Cryptography provides techniques, mechanisms, and tools for private and authenticated communication, and for performing secure and authenticated transactions over the Internet as well as other open networks. It is highly probable that each bit of information flowing through our networks will have to be either encrypted and decrypted or signed and authenticated in the near future. In such an environment, server and client computers as well as handheld, portable, and wireless devices will have to be capable of encrypting or decrypting and signing or verifying messages. Without exception, all networked computers and devices must have cryptographic layers implemented, and must be able to access to cryptographic functions in order to provide security features. In this context, efficient (in terms of time, area, and power consumption) hardware structures will have to be designed, implemented, and deployed. Furthermore, general-purpose (platform-independent) as well as special-purpose software implementing cryptographic functions on embedded devices are needed. An additional challenge is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels.

Projects

Electronic Voting

Whether someone is an expatriate, military, impaired, or simply busy, we want to maximize the number of engaged eligible voters and minimize election cost and complexity for election officials. Additionally, election security is just as important as reducing cost and complexity. Our internet voting research is focused on building secure affordable voting systems.

More

Cyber-Physical Security

Cell phones, medical devices, payment systems, vehicles, and control systems generally, are increasingly being targeted by hackers. As integrated circuit costs decrease, intelligence devices and systems will become even more pervasive and complex. In order to prevent future attacks, we perform fundamental research in the secure design of these systems.

More

Cryptographic Hardware and Embedded Systems

There are some significant challenges in high-speed, small-space (circuit size or code space) implementations of public-key cryptographic algorithms. An additional difficulty is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels. Our particular research and development areas are quite diverse and include architectures, side-channel analysis and countermeasures, and cryptographic processors and co-processors.

More

Elliptic Curve Cryptography and Finite Fields

Elliptic curve cryptography provides a general methodology for obtaining high-speed, efficient, and scalable implementations of cryptographically strong random number generators, public-key cryptographic and network security protocols. We develop algorithms, hardware and software realizations of elliptic curve cryptographic primitives.

More

Deterministic, Hybrid and True Random Number Generators

The security of modern cryptography relies on the quality of random numbers, used as secret keys, private keys, and ephemeral and initializing variables. We are working on new methods of building random number generators that are cryptographically strong however requiring minimal resources in terms of speed, space and power.

More