Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud

Periodic Reporting for period 2 - ECRYPT-NET (European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud)

Reporting period: 2017-03-01 to 2019-02-28

The goal of this ITN was to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create implementations that offer a high level of security and increased usability, for a wide range of physical computation platforms. The ITN equipped a group of 15 early stage researchers with a set of interdisciplinary skills combining mathematics, computer science and electrical engineering that allowed them to create advanced cryptographic solutions for commercial applications. The eight partners (including two companies) are internationally leading research teams in the area of applied cryptology with a strong track record of collaboration; the consortium has been complemented by six partner organizations from industry (including two SMEs). The researchers have been trained by research supported by an intensive program of workshops, summer schools, seminars, research visits, and secondments. The training has been complemented with transferable skills that also supported the transfer of research to an industrial context. The management structure of the project was built on a pro-active approach with responsibilization of the fellows. The project has created major technical contributions on cryptography for the Internet of Things (IoT), cryptography for the cloud and on physical security, usability and deployment. The project has contributed to several open international competitions, resulting in a high visibility and impact of the project outcome. The dissemination and outreach of the project activities targeted a broad range of stakeholders. The ITN contributed to the ERA by helping to overcome the fragmentation in the area of applied cryptology. The research supported the trust and security component of the Digital Agenda for Europe and responded to the growing attention of EU policy makers for societal needs related to privacy and cybersecurity; these developments require a broad deployment of innovative cryptographic techniques.
The research on cryptography for the Internet of Things (IoT) has focused on the design and cryptanalysis of lightweight methods for (authenticated encryption). On the one hand, novel design criteria have been proposed and analyzed, such as techniques to design building blocks that minimize the energy consumption, gate count or latency and building blocks that are easier to protect against side channel attacks. On the other hand, cryptanalytic techniques have been improved including algebraic attacks, interpolation attacks, and new quantum algorithms for second preimages. This dual approach is essential as confidence in cryptographic primitives can only be created by a careful analysis of the strength and weaknesses of novel designs.
For cloud applications, the project has focused on two challenges. The first one has been the study of novel cryptographic primitives that will resist attacks on future quantum computers (so-called post-quantum cryptography). The second one has been to create novel techniques for several flavors of secure computation, including computing on encrypted data (fully homomorphic encryption), controlled decryption of data (functional encryption) and jointly computing on privately stored data without sharing this data (secure Multi-Party Computation). The results include the identification of flaws in proposed schemes and the creation of new proposals with increased performance or reduced communication overhead. Finally, applications have been studied of these techniques such as the evaluation of machine learning algorithms in the encrypted domain and the study of querying capabilities on encrypted data.
A third line of research focused on physical security, usability and deployment; to this end, it developed innovative implementations; these implementations offer improved security/performance tradeoffs and resist powerful side channel attacks that exploit physical properties of the implementations. The research has focused on building such countermeasures against such attacks; unlike in earlier work, these countermeasures are included during the design of the primitive (cf. supra) or integrated in the design flow rather than added afterwards. The most powerful of these attacks are white box attackers, who have full control of the execution of the cryptographic algorithm (which is the case for typical IoT software environments); for this setting novel attack models and attacks have been studied. Several secure implementations have been developed for lightweight ciphers (IoT setting) and for post-quantum algorithms (cloud setting).
The project has contributed to several open international competitions, including the Whibox competition (organized by CryptoExperts) and the postquantum and lightweight competition organized by NIST (National Institute of Standards and Technology, US). These competitions have given the research a high visibility and impact at an international level.
Regarding dissemination, the project used Twitter for fast communication of project activities. Almost 300 tweets were sent out towards more than 1150 followers. The project’s ECRYPT Blog has been used to disseminate longer stories. An important goal of the Blog was to make complicated cryptographic results easily accessible to a wider audience. The ESRs were encouraged to post regularly to the blog on papers they have read, conferences they have visited, or their own results. So far 110 blogposts have been written, those attracted 171.899 views.
The fellows held 74 public talks at different occasions; 6 rump session presentations, 25 paper presentations at conferences, 38 presentations at ECRYPT-NET schools and 7 during outreach activities. The conference venues included some top venues in the field including CRYPTO, EUROCRYPT, FSE, CHES, TCC, Asiacrypt, RWC, SAC and ACNS. In this way research results were disseminated towards more than 5000 people of the research community.
The ESR fellows organized outreach activities, targeting the general public. Some fellows gave interactive lectures to secondary school pupils, other created crypto puzzles or mathematical challenges for online crypto contests or math competitions. The outreach activities turned out to be an excellent way to reach a young audience. Eventually 55 publications were produced, of which 18 journal papers and 37 conference papers. The conference publications included some of the most competitive conferences in the field such as EUROCRYPT, CRYPTO, Fast Software Encryption (FSE), Theory of Cryptography (TCC), Selected Areas in Cryptography (SAC), ASIACRYPT, Cryptographic Hardware and Embedded Systems (CHES), ACM CCS, IEEE S&P, and Usenix Security. Together, the fellows published 18 papers at these top venues.
The research in the ECRYPT-NET project supports the trust and security component of the Digital Agenda for Europe and responds to the growing attention of policy makers for societal needs related to privacy and cybersecurity.
The societal relevance and timeliness of this research has been emphasized by the growing importance of the digital society and by the revelations made by Snowden, that provide clear evidence of mass surveillance by nation states and of serious weaknesses of our current infrastructure.
An essential component of a response to these revelations consists of a broad deployment of advanced and innovative cryptographic techniques.
Picture of the ECRYPT-NET fellows at the summer school in Crete