International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.

Here you can see all recent updates to the IACR webpage. These updates are also available:

email icon
via email
RSS symbol icon
via RSS feed

27 April 2018

University of Surrey, Surrey Centre for Cyber Security, UK
Job Posting Job Posting
PhD position on Contactless Electronic Payments at Surrey Centre for Cyber Security, Univ. of Surrey, UK

A fully-funded PhD in contactless electronic payments and their security.

Tax-free stipend of 22,000 GBP per year + annual increments. UK citizenship is required.

The project focuses on the cryptographic design and provable security of extensions of the contactless version of the EMV (Europay, Mastercard and Visa) protocol-suite. The main aim is to protect against threats linked to impersonation and therefore fraudulent payments, stemming from relay attacks, but it is not restricted to this. A second goal is that this EMV-enhancement also gives a second authentication-factor to the payment procedure. The project has Consult Hyperion as an industrial partner, which is a company with world-class experience in EMV security.

To apply, please contact Dr Ioana Boureanu, at i.boureanu (at) surrey.ac.uk

Closing date for applications: 25 May 2018

Contact: Ioana Boureanu, at i.boureanu (at) surrey.ac.uk

More information: https://jobs.surrey.ac.uk/vacancy.aspx?ref=007318

Expand

26 April 2018

Input Output
Job Posting Job Posting
Founded in 2015 by Charles Hoskinson and Jeremy Wood, IOHK is a technology company committed to using peer-to-peer innovations to provide financial services to the three billion people who don’t have them. We are an engineering company that builds cryptocurrencies and block chains for academic institutions, government entities and corporations. We are a decentralized company that loves small innovative teams forming and executing ideas that cause cascading disruption.

Job Description

We are looking for a talented, specialised Security Manager to join our growing in-house Security team. The prospective candidate will oversee and coordinate the security process, from research to product development, and will be working with internal teams on embedding Security across IOHK’s project line.

The prospective candidate will be expected to assemble a team and work directly with research, engineering and Project Management (BA’s, Test and Quality, Cryptography and management teams throughout the current and future set of projects

The individual should have an excellent understanding of Security requirements in the Development lifecycle and have an excellent and detailed understanding of the threats and risks that need to be addressed in the development life cycle, specifically in the blockchain / cryptocurrency area.

Closing date for applications: 24 June 2018

Contact: David Rountree

Technical Recruiter

david.rountree (at) iohk.io

More information: https://iohk.io/careers/#op-250078-security-team-manager

Expand
Sapienza University of Rome (Italy)
Job Posting Job Posting
The Department of Computer, Control and Management Engineering Antonio Ruberti (DIAG) of Sapienza University of Rome invites outstanding candidates to express their interests for 1 full-time tenured position (full professor) in Cyber Security. The position is funded under the program ``Departments of Excellence´´ of the Italian Ministry of Education and Research that will help consolidating and strengthening the research group in Cyber Security at DIAG-Sapienza.

Profile

Candidates will hold a PhD from a leading research university, an established teaching experience, an appropriate record of publications in highly ranked international journals and conferences, an appropriate record of national and international grants as principle investigator, and an adequate record of supervision of PhD students or similar experience in leading research teams in industrial research. Candidates will also have either a tenured position status in a university or have recently obtained the appropriate national qualification (ASN) in the Academic Discipline ``Information Processing Systems´´ (ING-INF/05) of the Italian University System.

Position

Successful candidates will be engaged in first-class research in the area of Cyber Security, will supervise Master Thesis and PhD students in their fields, will contribute to the Master degree in Cyber Security at Sapienza University of Rome, and will be involved in collaborations with industry and public bodies. Appointments are full-time. The salary is competitive. We especially welcome expressions of interests from female scholars.

Expression of Interest

Application to be sent at recruitment (at) diag.uniroma1.it must contain the following:

1. Curriculum vitae

2. 3-page (max) research and teaching statement including the candidate research program that intends to pursue while at Sapienza.

Expressions of interest should preferably be sent before the end of May 2018. For further information, please consult recruitment (at) diag.uniroma1.it

Closing date for applications: 31 May 2018

Contact: recruitment (at) diag.uniroma1.it

Expand
Norwegian University of Science and Technology (NTNU)
Job Posting Job Posting
The goal of this PhD project is to study different constructions for hash chains, signature schemes and their surrounding protocols within blockchain technology. Analysis of their combined properties will be conducted from a cryptographic point of view, with emphasis on efficiency, privacy and anonymity. Modern methods of analysis will be applied to obtain high assurance of security. This project will be run in close conjunction with networking and security researchers and relate to application-oriented blockchain projects as target areas.

The research will be carried out within a program of 6 PhD projects under the heading of Trust and Transparency in Digital Society Through Blockchain Technology. This multi-disciplinary program includes technological aspects (cryptographic mechanisms, networking requirements, identity management), societal aspects and application areas. The program team involves 12 professors across several different departments and faculties. It is expected that the PhD fellow for this project will collaborate actively with other PhD fellows involved in the overall program and contribute to plenary meetings of the program. This program forms part of the NTNU Digital Transformation initiative.

Closing date for applications: 27 May 2018

Contact: For further information about the position, please contact Professor Kristian Gjøsteen (kristian.gjosteen (at) ntnu.no), or Professor Colin Boyd (colin.boyd (at) ntnu.no) for information about the Trust and Transparency in Digital Society Through Blockchain Technology project.

More information: https://www.jobbnorge.no/en/available-jobs/job/151330/

Expand
University of South Florida, Tampa, FL, USA
Job Posting Job Posting
We are looking for hardworking and self-driven PhD students to work in the areas of applied cryptography beginning from August 2018 or January 2019. University of South Florida is a Rank 1 Research University and offers a competitive salary with an excellent working environment, all within a close proximity of high-tech industry and beautiful beaches of Sunny Florida. Tampa/Orlando area is a key part of Florida High Technology Corridor, and harbors major tech and research companies. The qualified candidate will have opportunities for research internship and joint-projects with lead-industrial companies. Topics:

Trustworthy Unmanned Aerial Systems

• New cryptographic frameworks to protect aerial drones

Trustworthy Machine Learning (TML)

• Privacy-Preserving Machine Learning

• Adversarial Machine Learning

Breach-Resilient Cyber-Infrastructures:

• New searchable encryption and Oblivious RAM schemes

• Augmentation of privacy enhancing technologies with trusted execution environments

Secure and Reliable IoT and Cryptocurrencies

• Post-Quantum public key infrastructure for IoT

• Use of Blockchain for Cyber Security

Requirements:

• A BS degree in computer science, electrical engineering or mathematics with a high-GPA.

• Very good programming skills (e.g., C, C++), familiarity with OS/Systems.

• Good Academic Writing and Presentation Skills.

• MS degree in computer science, electrical engineering or mathematics is a big plus. Publications in security and privacy are highly desirable.

Please send (by e-mail): (i) Transcripts, (ii) Curriculum vitae, (iii) Three reference letters, (iv) Research statement, (v) GRE and TOEFL scores

Closing date for applications: 15 September 2018

Contact: Dr. Attila A. Yavuz

attila.yavuz (at) gmail.com

More information: http://web.engr.oregonstate.edu/~yavuza/article/PositionDescrption_at_USF.pdf

Expand
CRYPTO CRYPTO
The proceedings for Crypto 2018 are now available via SpringerLink. Through our agreement with Springer, IACR members can access these proceedings for free by logging into this access page. The conference will be held April 29 - May 3 in Tel Aviv.
Expand

25 April 2018

Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
ePrint Report ePrint Report
In this paper, we study several related computational problems for supersingular elliptic curves, their isogeny graphs, and their endomorphism rings. We prove reductions between the problem of path finding in the $\ell$-isogeny graph, computing maximal orders isomorphic to the endomorphism ring of a supersingular elliptic curve, and computing the endomorphism ring itself. We also give constructive versions of Deuring's correspondence, which associates to a maximal order in a certain quaternion algebra an isomorphism class of supersingular elliptic curves. The reductions are based on heuristics regarding the distribution of norms of elements in quaternion algebras.

We show that conjugacy classes of maximal orders have a representative of polynomial size, and we define a way to represent endomorphism ring generators in a way that allows for efficient valuation at points on the curve. We relate these problems to the security of the Charles-Goren-Lauter hash function. We provide a collision attack for special but natural parameters of the hash function and prove that for general parameters its preimage and collision resistance are also equivalent to the endomorphism ring computation problem.
Expand

24 April 2018

A.V. Menyachikhin
ePrint Report ePrint Report
S-boxes are important parts of modern ciphers. To construct S-boxes having cryptographic parameters close to optimal is an unsolved problem at present time. In this paper some new methods for generating such S-boxes are introduced.
Expand
Hyung Tae Lee, Huaxiong Wang, Kai Zhang
ePrint Report ePrint Report
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for IBEET, which is slightly weaker than the indistinguishability under adaptive identity and chosen ciphertext attacks (IND-ID-CCA2) for traditional identity-based encryption. Then, they claimed that their proposed scheme achieves this new security notion under the Bilinear Diffie-Hellman (BDH) assumption in the random oracle model.

In this paper, we demonstrate that their scheme does not achieve the claimed security requirement by presenting an attack. Our attack algorithm is very simple: It requires only a pair of message and ciphertext, and takes one exponentiation and two bilinear map evaluations. Subsequently, we present a modification of their IBEET construction and show that it satisfies their security notion under the BDH assumption and the existence of strong pseudorandom permutation and existentially unforgeable message authentication code in the random oracle model. We remark that our modification has better efficiency than the original construction.
Expand
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
ePrint Report ePrint Report
In Public-Key Encryption, traditionally no security is expected if honest parties use keys provided by an adversary. In this work, we re-examine this premise. While using untrusted keys may seem nonsensical at first glance, we argue the use of providing certain security guarantees even in such situations. We propose Chosen Object Attack (COA) security as a broad generalization of various notions of security that have been considered in the literature, including CCA security, key anonymity and robustness, along with concerns arising from untrusted keys. The main premise of this definition is that any of the objects in a cryptographic scheme could be adversarialy generated, and that should not compromise the security of honest parties in a way an idealized scheme would not have.

Our contributions are threefold.

• Firstly, we develop a comprehensive security definition for PKE in the real/ideal paradigm. Our definition subsumes CCA2 security, Anonymity and Robustness as special cases, and also addresses security concerns in complex application scenarios where the keys may be malicious (without having to explicitly model the underlying attack scenarios). To avoid impossibility results associated with simulation-based security, we use the notion of indistinguishability-preserving security (IND-PRE) from the “Cryptographic Agents” framework (Agrawal et al., EUROCRYPT 2015). Towards this, we extend this framework to accommodate adversarially created objects. Our definition can alternately be interpreted as the union of all possible game-based security definitions. We remark that the agents framework as extended in this work is applicable to primitives other than Public-Key Encryption, and would be of broader significance.

• Secondly, and somewhat surprisingly, we show that in the case of PKE, the above comprehensive definition is implied by a simpler definition (which we call COA security) that combines a traditional game-based definition with a set of consistency requirements. The proof of this implication relies on an extensive analysis of all possible executions involving arbitrarily many keys and ciphertexts, generated, transferred between parties and used in an arbitrary and adaptive manner.

• Thirdly, we consider constructions. Interestingly, using the above security definition, we show that the Cramer-Shoup cryptosystem (with minor modifications) already meets our definition. Further, we present transformations from any Anonymous CCA2-secure PKE scheme to a COA-secure PKE. Under mild correctness conditions on the Anonymous CCA2-secure PKE scheme, our transformation can be instantiated quite efficiently and is arguably a viable enhancement for PKE schemes used in practice.
Expand
Alejandro Cabrera Aldaya, Cesar Pereida Garc{\'i}a, Luis Manuel Alvarez Tapia, Billy Bob Brumley
ePrint Report ePrint Report
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant-time code paths are driven by cryptosystem implementations enabling a dedicated flag at runtime. This process is perilous, with several examples emerging in the past few years of the flag either not being set or software defects directly mishandling the flag.

In this work, we propose a methodology to analyze security-critical software for side-channel insecure code path traversal.

Applying our methodology to OpenSSL, we identify three new code paths during RSA key generation that potentially leak critical algorithm state.

Exploiting one of these leaks, we design, implement, and mount a single trace cache-timing attack on the GCD computation step. We overcome several hurdles in the process, including but not limited to:

(1) granularity issues due to word-size operands to the GCD function;

(2) bulk processing of desynchronized trace data;

(3) non-trivial error rate during information extraction; and

(4) limited high-confidence information on the modulus factors.

Formulating lattice problem instances after obtaining and processing this limited information, our attack achieves roughly a 28 % success rate for key recovery using the empirical data from roughly 10K trials.
Expand
Barcelona, Catalonia, 6 September - 7 September 2018
Event Calendar Event Calendar
Event date: 6 September to 7 September 2018
Submission deadline: 18 June 2018
Expand
University of Luxembourg
Job Posting Job Posting
The Cryptolux/SnT team of the University of Luxembourg is offering one Ph.D. student position in Applied Cryptography for the FinCrypt project funded by the Luxembourg research fund (FNR). The project will study security, scalability and privacy of distributed ledgers and smart contracts. Candidates with expertise or interest in the following areas are welcome to apply:

- Applied Cryptography (SK or PK)

- Crypto-currencies, smart-contracts, financial cryptography

- Privacy enhancing technologies

- Distributed consensus protocols

- Cybersecurity

We offer:

You will work in an exciting international environment and will carry leading edge research in these hot research areas. Luxembourg’s financial center is one of the largest in Europe and our team is part of Security and Trust (SnT) research center (>200 people researching all aspects of IT security). The University offers highly competitive salaries (about 34,000 euro/year gross + benefits) and is an equal opportunity employer.

Applications, written in English, should be submitted by e-mail, and will be considered on receipt therefore applying before the deadline is highly encouraged.

Closing date for applications: 31 May 2018

Contact: Prof. Alex Biryukov

More information: https://www.cryptolux.org/index.php/Vacancies

Expand

21 April 2018

Lille, France, 29 October - 31 October 2018
Event Calendar Event Calendar
Event date: 29 October to 31 October 2018
Submission deadline: 8 June 2018
Notification: 20 July 2018
Expand
Carnegie Mellon University, PA, USA
Job Posting Job Posting
Postdoc research fellow positions available at CMU. Sample research topics include: secure multi-party computation, zero-knowledge proofs, blockchains and cryptocurrencies, and, non-malleable cryptography. However working in any topic within cryptography is possible. Must have a strong publication record in Crypto/Eurocrypt/TCC/STOC/FOCS. Dates are open.

Closing date for applications: 1 November 2018

Contact: Please contact Vipul Goyal at vipul (at) cmu.edu

More information: http://www.cs.cmu.edu/~goyal/

Expand

20 April 2018

Institute of Science and Technology Austria (IST Austria)
Job Posting Job Posting
The cryptography group at the Institute of Science and Technology Austria (IST Austria) seeks two postdoctoral researchers, supported by an EU H2020 project (ERC-CoG TOCNeT) on provable security. IST Austria is a recently established basic research institute in the woods of Vienna.

The candidates should have a strong record in cryptography, witnessed by publications at top cryptography (Crypto,Eurocrypt,TCC,...) and/or security conferences (CCS,S&P,...). Current topics investigated in our group include

  • Sustainable Blockchains
  • Memory-Hard Functions
  • Leakage-Resilient Cryptography
  • Lattice-Based Cryptography
  • Adaptive Security
  • Pseudoentropy

The post-doctoral position is provided for up to four years with very competitive salary. The starting dates are flexible. There is no fixed deadline, applications will be considered until the position is filled.

Applications should include CV and a statement of research experience and interests. Please send applications to Krzysztof Pietrzak.

Closing date for applications: 1 September 2018

Contact: Krzysztof Pietrzak pietrzak (at) ist.ac.at

More information: http://pub.ist.ac.at/crypto/

Expand

19 April 2018

Norwegian University of Science and Technology (NTNU)
Job Posting Job Posting
In order to strengthen research and teaching in cryptography at NTNU we are opening a position at the associate professor level (either permanent or tenure track) at the Department of Mathematical Sciences.

The current cryptography group at NTNU works mostly in cryptographic protocol analysis and cryptographic primitives design, with significant applied work in electronic voting. The goal is either to strengthen existing research activities in cryptographic protocol analysis or contribute to complementary areas, such as secure multiparty computation or cryptographic applications of computational number theory/algebraic geometry.

This position is one out of nine strategic professorships announced simultaneously at NTNU. There is also a position in Secure Systems Engineering for which cryptographers may apply.

Closing date for applications: 1 June 2018

Contact: Kristian Gjøsteen, kristian.gjosteen (at) ntnu.no, +47 73 55 02 42

More information: https://www.ntnu.edu/positions-ie

Expand
Iasi, Romania, 20 September - 21 September 2018
Event Calendar Event Calendar
Event date: 20 September to 21 September 2018
Submission deadline: 27 May 2018
Notification: 15 July 2018
Expand

18 April 2018

Ahmad Ahmadi, Reihaneh Safavi-Naini
ePrint Report ePrint Report
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. A public key distance bounding relies on the public key of the users to prove their identity and proximity claim. There has been a number of approaches in the literature to formalize security of public key distance bounding protocols. In this paper we extend an earlier work that formalizes security of public key DB protocols using an approach that is inspired by the security definition of identification protocols, and is referred to it as distance-bounding identification (DBID). We first show that if protocol participants have access to a directional antenna, many existing protocols that have been proven secure, will become insecure, and then show to revise the previous model to include this new capability of the users. DBID approach provides a natural way of modeling man-in-the-middle attack in line with identification protocols, as well as other attacks that are commonly considered in distance bounding protocols. We propose a new DBID scheme, called Poxy, with security proof. We compare the existing public key DB models, and prove the security of the scheme known as ProProx, in our model.
Expand
Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
ePrint Report ePrint Report
Anonymous Distance-Bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound from them, without revealing their identity. This is an attractive property that enables the prover to enjoy proximity based services, while their privacy is maintained. Combination of anonymity and distance-bounding however introduces new security challenges. We consider two new realistic attacks: a physical layer attack that uses directional antenna, and a collusion attack that involves multiple users. We show all existing anonymous DB protocols become insecure against at least one of these attacks, and then propose a new security model that captures these new attacks, and finally construct two protocols with provable security in this model. Our protocols are the only known anonymous DB protocols with provable security against known attacks.
Expand
◄ Previous Next ►