Efficient and Secure Implementation of Cryptographic Primitives
Compiler-Assisted Side-Channel Attack Countermeasures
This project aims at defending software implementations of encryption/decryption primitives from attacks based on side channels such as energy dissipation or electromagnetic emissions.
Techniques developed include code morphing, a technique to alter the code at runtime without changing its overall semantics. Such techniques hinder the construction of a model correlating the side channel information with the values of the secret key.
Accelerating Cryptography with GPGPU
Fast encryption on massive amount of data is important for both security of large scale data (e.g., volume or disk encryption) and for attacks against specific cryptosystems.
We develop fast implementations of standard cryptographic primitives such as AES and DES using GPGPU technology, striving for the best performance per euro ratio.
Team
- Gerardo Pelosi: scientific lead
- Giovanni Agosta: code morphing technology
- Alessandro Barenghi: oscilloscope man & jack of all trades
- Michele Scandale: LLVM extensions development
- Alessandro Di Federico: cryptography on GPGPU, reverse engineering
- Francesco Fiduccia: code morphing framework integration
Past Team Members
- Andrea Di Biagio: AES on CUDA
- Fabrizio De Santis: DES on CUDA
- Massimo Maggi: LLVM extensions development