International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2014-12-25
07:17 [Pub][ePrint] DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS, by Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce

  The future development of quantum-computers could turn many key agreement algorithms used in the Internet today fully insecure, endangering many applications such as online banking, e-commerce, e-health, etc. At the same time, the Internet is further evolving to enable the Internet of Things (IoT) in which billions of devices

deployed in critical applications like healthcare, smart cities

and smart energy are being connected to the Internet. The IoT not only requires strong and quantum-secure security, as current Internet applications, but also efficient operation. The recently introduced HIMMO scheme enables lightweight identity-based key sharing and verification of credentials in a non-interactive way. The collusion resistance properties of HIMMO enable direct secure communication between any pair of Internet-connected devices. The facts that attacking HIMMO requires lattice techniques and that it is extremely lightweight make HIMMO an ideal lightweight approach for key agreement and information verification in a post-quantum world.

Building on the HIMMO scheme, this paper firstly shows how HIMMO can be efficiently implemented even in resource-constrained devices enabling combined key agreement and credential verification one order of magnitude more efficiently than using ECDH-ECDSA, while being

quantum secure. We further explain how HIMMO helps to secure the Internet and IoT by introducing the DTLS- HIMMO operation mode. DTLS, the datagram version of TLS, is becoming the standard security protocol in the IoT, however, it is very frequently discussed that it does not offer the right performance for IoT scenarios. Our design,

implementation, and evaluation show that DTLS-HIMMOoperation mode achieves the security properties of DTLS Certificate security suite while being quantum secure and exhibiting the overhead of symmetric-key primitives.





2014-12-24
07:10 [Event][New] SAC'15: Selected Areas in Cryptography 2015

  Submission: 25 May 2015
Notification: 6 July 2015
From August 12 to August 14
Location: Sackville, Canada
More Information: http://mta.ca/sac2015/




2014-12-22
16:41 [PhD][Update] Olivier Billet: Cryptologie multivariable

  Name: Olivier Billet
Topic: Cryptologie multivariable
Category:(no category)





2014-12-21
15:29 [Event][New] C2SI-berger2015: International Conference in "Codes, Cryptology and Information Security"

  Submission: 31 January 2015
Notification: 15 March 2015
From May 26 to May 28
Location: Rabat, Morocco
More Information: http://www.fsr.ac.ma/C2SI-Berger2015/




2014-12-20
20:00 [PhD][New] Paul Camion

  Name: Paul Camion


19:59 [PhD][New] Khaled Ouafi: Security and Privacy in RFID Systems

  Name: Khaled Ouafi
Topic: Security and Privacy in RFID Systems
Category: cryptographic protocols

Description: This PhD thesis is concerned with authentication protocols using portable lightweight devices such as RFID tags. these devices have lately gained a significant attention for the diversity of the applications that could benefit form their features, ranging from inventory systems and building access control, to medical devices. However, the emergence of this technology has raised concerns about the possible loss of privacy carrying such tags induce in allowing tracing persons or unveiling the contents of a hidden package. This fear led to the appearance of several organizations which goal is to stop the spread of RFID tags. We take a cryptographic viewpoint on the issue and study the extent of security and privacy that RFID-based solutions can offer. In the first part of this thesis, we concentrate on analyzing two original primitives that were proposed to ensure security for RFID tags. the first one, HB#, is a dedicated authentication protocol that exclusively uses very simple arithmetic operations: bitwise AND and XOR. HB# was proven to be secure against a certain class of man-in-the-middle attacks and conjectured secure against more general ones. We show that the latter conjecture does not hold by describing a practical attack that allows an attacker to recover the tag\'s secret key. Moreover, we show that to be immune against our attack, HB#\'s secret key size has to be increased to be more than 15 000 bits. this is an unpractical value for the considered applications. We then turn to SQUASH, a message authentication code built around a public-key encryption scheme, namely Rabin\'s scheme. By mounting a practical key recovery attack on the earlier version of SQUASH, we show that the security of all versions of SQUASH is unrelated to the security of Rabin encryption function. The second part of the thesis is dedicated to the privacy aspects related to the RFID technology. We first emphasize the importance of establishing a framework that correctly captures the intu[...]


19:59 [PhD][New] Olivier Billet: Multivariate cryptology

  Name: Olivier Billet
Topic: Multivariate cryptology
Category: (no category)



19:57 [PhD][New]

 

19:56 [PhD][New] Jacques Patarin: Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S.

  Name: Jacques Patarin
Topic: Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S.
Category: secret-key cryptography





2014-12-19
18:00 [News] Call for IACR Cryptology School Proposals

 

In 2014, IACR started to sponsor a small number of Cryptology Schools providing intensive training on clearly identified topics in cryptology. The aim of this program is to develop awareness and increased capacity for research in cryptology.

A Cryptology School is typically held full-time for 4-5 days of intensive learning and constitutes an efficient way to provide high-quality training for graduate students, as well as for professionals. Attendance should be open to anyone who is interested and qualified. In order to facilitate learning, a school is usually taught by a few domain experts with a focus on educating the audience rather than impressing with results. In line with the mission of IACR, a Cryptology School should enable the audience to advance the theory and practice of cryptology and related fields.

There are two rounds of submissions every year. The submission deadlines are:

  • December 31st of year X-1: For schools that take place between March of year X and February of year X + 1.
  • June 30th of year X: For schools that take place between September of year X and August of year X + 1.
Submissions must be sent by email to schools@iacr.org.

For more information about this new program and how to prepare a proposal, please refer to http://www.iacr.org/schools/



15:09 [Event][New] RCD 2015: 3rd Romanian Cryptology Days Conference

  Submission: 15 May 2015
Notification: 15 June 2015
From September 21 to September 23
Location: Bucharest, Romania
More Information: http://www.sie.ro/rcd2015/