51 résultats
-
Bridging Deep Learning and Classical Profiled Side-Channel Attacks
Orateur : Gabriel Zaid
Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret[…] -
Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.
Orateur : Sofiane Takarabt
Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…] -
When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases
Orateur : Duy-Phuc Pham et Damien Marion
The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…] -
Rank metric cryptography and its implementations
Orateur : Nicolas Aragon
In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…] -
Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection
Orateur : Itamar Levi
In this seminar I will first discuss unique computer aided design (CAD) compatible SCA security mechanisms. I will present an approach which can significantly increase the physical security-level of a design, be implemented with conventional design-tools and which does not require any special technological-support. The method consists with a correct by-design utilization of power-management[…] -
Code-based postquantum cryptography : candidates to standardization
Orateur : Nicolas Sendrier
At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…]