img
img

News

img

Jun 2017 -- CPSEd Workshop

The Cyber-Physical Security Education Workshop will be held in June 2017 in Paris. The website for the workshop contains the steering committee and invited speakers, as they become available: CPSEd Workhop

img

Sep 2016 ‒ NATO Workshop on PQC

Koç is a speaker at the NATO Workshop on Secure Implementation of PQC, held at Tel Aviv University on Sep 26-27. His talk title: Hardware Trojans in Incompletely Specified Digital Systems. URL

img

Aug 2016 ‒ FPL 2016

"Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams", authored by San, Fern, Koç, and Cheng, is accepted by FPL 2016. URL

img

May 2016 ‒ Cryptographic Engineering 6/3

Journal of Cryptographic Engineering (JCEN) is the the official journal of the Cryptographic Hardware and Embedded Systems (CHES) community. Koç is the founding editor-in-chief of JCEN. 2016/3

img

Jul 2016 - NSF Funding

NSF has awarded funding to Çetin Kaya Koç to develop Cyber Physical Systems Security Education Workshop. See NSF Page and CPSEd Workshop Website.

img

Oct 2015 ‒ NSF Funding

NSF has awarded funding to Tim Cheng and Çetin Kaya Koç to develop new methods of preventing and detecting hardware Trojans. See NSF Page and the Project Page.

Our Research Goals

Cryptography provides techniques, mechanisms, and tools for private and authenticated communication, and for performing secure and authenticated transactions over the Internet as well as other open networks. It is highly probable that each bit of information flowing through our networks will have to be either encrypted and decrypted or signed and authenticated in the near future. In such an environment, server and client computers as well as handheld, portable, and wireless devices will have to be capable of encrypting or decrypting and signing or verifying messages. Without exception, all networked computers and devices must have cryptographic layers implemented, and must be able to access to cryptographic functions in order to provide security features. In this context, efficient (in terms of time, area, and power consumption) hardware structures will have to be designed, implemented, and deployed. Furthermore, general-purpose (platform-independent) as well as special-purpose software implementing cryptographic functions on embedded devices are needed. An additional challenge is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels.

Projects

Electronic Voting

Whether someone is an expatriate, military, impaired, or simply busy, we want to maximize the number of engaged eligible voters and minimize election cost and complexity for election officials. Additionally, election security is just as important as reducing cost and complexity. Our internet voting research is focused on building secure affordable voting systems.

More

Cyber-Physical Security

Cell phones, medical devices, payment systems, vehicles, and control systems generally, are increasingly being targeted by hackers. As integrated circuit costs decrease, intelligence devices and systems will become even more pervasive and complex. In order to prevent future attacks, we perform fundamental research in the secure design of these systems.

More

Cryptographic Hardware and Embedded Systems

There are some significant challenges in high-speed, small-space (circuit size or code space) implementations of public-key cryptographic algorithms. An additional difficulty is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels. Our particular research and development areas are quite diverse and include architectures, side-channel analysis and countermeasures, and cryptographic processors and co-processors.

More

Elliptic Curve Cryptography and Finite Fields

Elliptic curve cryptography provides a general methodology for obtaining high-speed, efficient, and scalable implementations of cryptographically strong random number generators, public-key cryptographic and network security protocols. We develop algorithms, hardware and software realizations of elliptic curve cryptographic primitives.

More

Deterministic, Hybrid and True Random Number Generators

The security of modern cryptography relies on the quality of random numbers, used as secret keys, private keys, and ephemeral and initializing variables. We are working on new methods of building random number generators that are cryptographically strong however requiring minimal resources in terms of speed, space and power.

More