Objective
SAFEcrypto will provide a new generation of practical, robust and physically secure post quantum cryptographic solutions that ensure long-term security for future ICT systems, services and applications. Novel public-key cryptographic schemes (digital signatures, authentication, public-key encryption, identity-based encryption) will be developed using lattice problems as the source of computational hardness.
The project will involve algorithmic and design optimisations, and implementations of the lattice-based cryptographic schemes addressing the cost, energy consumption, performance and physical robustness needs of resource-constrained applications, such as mobile, battery-operated devices, and of real-time applications such as network security, satellite communications and cloud.
Currently a significant threat to cryptographic applications is that the devices on which they are implemented on leak information, which can be used to mount attacks to recover secret information. In SAFEcrypto the first analysis and development of physical-attack resistant methodologies for lattice-based cryptographic implementations will be undertaken.
Effective models for the management, storage and distribution of the keys utilised in the proposed schemes (key sizes may be in the order of kilobytes or megabytes) will also be provided.
This project will deliver proof-of-concept demonstrators of the novel lattice-based public-key cryptographic schemes for three practical real-word case studies with real-time performance and low power consumption requirements. In comparison to current state-of-the-art implementations of conventional public-key cryptosystems (RSA and Elliptic Curve Cryptography (ECC)), SAFEcrypto’s objective is to achieve a range of lattice-based architectures that provide comparable area costs, a 10-fold speed-up in throughput for real-time application scenarios, and a 5-fold reduction in energy consumption for low-power and embedded and mobile applications.
Fields of science
- natural sciencescomputer and information sciencesinternetinternet of things
- natural sciencescomputer and information sciencessoftware
- natural sciencescomputer and information sciencescomputer securitycryptography
- natural sciencesmathematicspure mathematicsarithmetics
- natural sciencescomputer and information sciencescomputer securitynetwork security
Programme(s)
Funding Scheme
RIA - Research and Innovation actionCoordinator
BT7 1NN Belfast
United Kingdom
See on map
Participants (9)
44801 Bochum
See on map
6900 Lugano
See on map
78153 Le Chesnay Cedex
See on map
Legal entity other than a subcontractor which is affiliated or legally linked to a participant. The entity carries out work under the conditions laid down in the Grant Agreement, supplies goods or provides services for the action, but did not sign the Grant Agreement. A third party abides by the rules applicable to its related participant under the Grant Agreement with regard to eligibility of costs and control of expenditure.
75230 Paris Cedex 05
See on map
Legal entity other than a subcontractor which is affiliated or legally linked to a participant. The entity carries out work under the conditions laid down in the Grant Agreement, supplies goods or provides services for the action, but did not sign the Grant Agreement. A third party abides by the rules applicable to its related participant under the Grant Agreement with regard to eligibility of costs and control of expenditure.
75794 Paris
See on map
RG2 6GF Reading
See on map
P31 Ovens
See on map
LA1 4TZ Lancaster
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
8803 Rueschlikon
See on map