Skip to main content

Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module

Deliverables

Runtime Risk Assessment, Resilience and Mitigation Planning – First Release

This deliverable relies on the output of Tasks 4.3, 4.4 & 4.5, and provides complementary functionality of the risk assessment framework delivered in D4.2. More specifically, it handles the unacceptable calculated risks by inferring (using backward-chaining techniques) the optimal mitigation actions (i.e., properties that have to be reactively attested) that have to be applied.

Project quality plan

The project quality plan (the project handbook) constitutes a set of project templates, explanations on the project management process, review process, quality checks, meeting organisation, which is communicated to all partners.

Security Risks in QR Deployments

Documentation of the security problems and risks that classical protocols, to be employed in the three envisioned use cases, might face in the presence of quantum adversaries.

First Report on the Security of the TPM

Initial report outlining security arguments for the integrated TPM functionality.

FutureTPM Reference Architecture

This deliverable will provide the specification of the FutureTPM reference architecture, the functional components and interfaces between them. It will provide an analysis and point of reference for the FutureTPM in relation to the three specific use cases, including an analysis of relevant classical protocols and the use cases themselves in terms of FutureTPM functionality.

First Report on New QR Cryptographic Primitives

This deliverable reports on the work done by all tasks, including the surveys, the newly developed algorithms, and the full specification of the candidate algorithms (TPM and TSS) that are to be implemented and evaluated by WP5.

First Report on Security Models for the TPM

Initial report describing and outlining security models for various implementations of TPM.

Risk Assessment Plan

The risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the [ACRONYM] project objectives. The interrelated risk assessment plan – risk identification, handling and monitoring – will be established.

FutureTPM Use Cases and System Requirements

This deliverable will define the three use cases the FutureTPM will address. It will provide a detailed view of FutureTPM’s reference scenarios and describe a number of use cases within the reference scenarios. It will then derive the technical requirements for the FutureTPM project, including an analysis of how present-day TPM functionality can be implemented using QR cryptography.

Threat Modelling & Risk Assessment Methodology

This deliverable provides the normative specification of a meta-model which will be used by security analysts in order to capture the cartography of a QR TPM supported environment and the non-normative specification of a multi-step RA methodology that has to be applied prior to the risk quantification. It also provides the approach for integrating multiple levels of risk analysis and dependencies such as safety.

Internal and external IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the FutureTPM project to external target groups including conferences, marketing measures and communication channels. Furthermore this deliverable constitutes the launch of the internal communication infrastructure including the establishment of mailing lists or a subversion server, and the FutureTPM website.

Searching for OpenAIRE data...

Publications

Implementing RLWE-based Schemes Using an RSA Co-Processor

Author(s): Albrecht, Martin R.; Hanser, Christian; Höller, Andrea; Pöppelmann, Thomas; Virdia, Fernando; Wallner, Andreas
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2019, Issue 1, Issue Issue 1, 2018
DOI: 10.5281/zenodo.1486566

NTTRU: Truly Fast NTRU Using NTT

Author(s): Vadim Lyubashevsky, Gregor Seiler
Published in: Conference on Cryptographic Hardware and Embedded Systems 2019 , 2019
DOI: 10.13154/tches.v2019.i3.180-201

An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster

Author(s): Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
Published in: Cryptology ePrint Archive: Report 2019/500; ESORICS 2019, 2019

Optimal TNFS-secure pairings on elliptic curves with composite embedding degree

Author(s): Georgios Fotiadis (SnT, University of Luxembourg), Chloe Martindale (Technische Universiteit Eindhoven)
Published in: Latincrypt 2019, 2019

A forensic investigation of Android mobile applications

Author(s): Theodoula-Ioanna Kitsaki, Anna Angelogianni, Christoforos Ntantogian, Christos Xenakis
Published in: Proceedings of the 22nd Pan-Hellenic Conference on Informatics - PCI '18, 2018, Page(s) 58-63
DOI: 10.1145/3291533.3291573

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation

Author(s): Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos
Published in: 2019 IEEE Conference on Network Softwarization (NetSoft), 2019, Page(s) 84-92
DOI: 10.1109/netsoft.2019.8806658

HyPoRes: An Hybrid Representation System for ECC

Author(s): Martins, Paulo; Marrez, Jérémy; Bajard, Jean-Claude; Sousa, Leonel
Published in: 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), Issue 14, 2019
DOI: 10.5281/zenodo.3946125

An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster

Author(s): Bajard, J.; Eynard, J.; Martins, P.; Sousa, L.; Zucca, V.
Published in: Issue 13, 2019
DOI: 10.5281/zenodo.3947788

A Tale of Two Worlds - Assessing the Vulnerability of Enclave Shielding Runtimes

Author(s): Jo Van Bulck, David Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 1741-1758
DOI: 10.1145/3319535.3363206

Optimal TNFS-secure pairings on elliptic curves with composite embedding degree

Author(s): Fotiadis, G.; Martindale, C.
Published in: info:eu-repo/grantAgreement/EC/H2020/779391, Issue 14, 2019
DOI: 10.5281/zenodo.3947834

Securing V2X Communications for the Future - Can PKI Systems offer the answer?

Author(s): Thanassis Giannetsos, Ioannis Krontiris
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-8
DOI: 10.1145/3339252.3340523

A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers

Author(s): Cheng, H.; Großschädl, J.; Rønne, P.; Ryan, P.
Published in: info:eu-repo/grantAgreement/EC/H2020/779391, Issue 8, 2019
DOI: 10.5281/zenodo.3947856

Machine-Checked Proofs for Cryptographic Standards - Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3

Author(s): José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 1607-1622
DOI: 10.1145/3319535.3363211

" A Game of ""Cut and Mouse"": Bypassing Antivirus by Simulating User Inputs "

Author(s): Genç, Z.; Lenzini, G.; Sgandurra, D.
Published in: Issue 9, 2019
DOI: 10.5281/zenodo.3951918

[Preprint] ObjectMap: Detecting Insecure Object Deserialization

Author(s): Koutroumpouchos Nikolaos; Lavdanis Georgios; Eleni, Veroni; Ntantogian Christoforos; Xenakis Christos
Published in: Issue 13, 2019
DOI: 10.5281/zenodo.3553675

Subverting Decryption in AEAD

Author(s): Armour, M.; Poettering, B.
Published in: Issue 2, 2019
DOI: 10.5281/zenodo.3951943

Substitution Attacks against Message Authentication

Author(s): Armour, M.; Poettering, B.
Published in: Issue 8, 2019
DOI: 10.13154/tosc.v2019.i3.152-168

Plundervolt: Software-based Fault Injection Attacks against Intel SGX

Author(s): Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens
Published in: 2020 IEEE Symposium on Security and Privacy (SP), 2020, Page(s) 1466-1482
DOI: 10.1109/sp40000.2020.00057

Efficient and Secured Implementation of PostQuantum Cryptography

Author(s): Pöppelmann, T.
Published in: Issue 6, 2020
DOI: 10.5281/zenodo.3952200

Risk-Limiting Tallies

Author(s): Jamroga, W.; Roenne, P.; Ryan, P.; Stark, P.
Published in: Issue 7, 2019
DOI: 10.5281/zenodo.3952218

A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things

Author(s): Cheng, H.; Dinu, D.; Großschädl, P.; Rønne, P.; Ryan, P.
Published in: Issue 7, 2019
DOI: 10.5281/zenodo.3952246

Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Author(s): Beunardeau, M.; Orche, F.; Maimuţ, D.; Naccache, D.; Rønne, P.; Ryan, P.
Published in: Issue 3, 2019
DOI: 10.5281/zenodo.3952268

Software Emulation of Quantum Resistant Trusted Platform Modules

Author(s): Fiolhais, L.; Martins, P.; Sousa, L.
Published in: 2020
DOI: 10.5281/zenodo.3979200

Post-Quantum Key Encapsulation on 8-bit Microcontrollers: A New Hope for the IoT

Author(s): Hao Cheng, Johann Groszschaedl, Peter Roenne, Peter Ryan
Published in: 2020
DOI: 10.5281/zenodo.3980419

[Preprint] Transforming malicious code to ROP gadgets for antivirus evasion

Author(s): Ntantogian Christoforos; Poulios Georgios; Karopoulos Georgios; Xenakis Christos
Published in: IET Information Security , Issue 3, 2019
DOI: 10.5281/zenodo.3239991

Can you sign a quantum state?

Author(s): Alagic, Gorjan; Gagliardoni, Tommaso; Majenz, Christian
Published in: arXiv.org, Issue 1, 2018

Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber

Author(s): Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald
Published in: 2020
DOI: 10.5281/zenodo.3979188

Floppy-Sized Group Signatures from Lattices

Author(s): Cecilia Boschini, Jan Camenisch, Gregory Neven
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 163-182
DOI: 10.1007/978-3-319-93387-0_9

Certificateless Public Key Signature Schemes from Standard Algorithms

Author(s): Zhaohui Cheng, Liqun Chen
Published in: Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings, Issue 11125, 2018, Page(s) 179-197
DOI: 10.1007/978-3-319-99807-7_11

Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts

Author(s): Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Issue 11442, 2019, Page(s) 344-373
DOI: 10.1007/978-3-030-17253-4_12

Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs

Author(s): Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Issue 11692, 2019, Page(s) 176-202
DOI: 10.1007/978-3-030-26948-7_7

On Deception-Based Protection Against Cryptographic Ransomware

Author(s): Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Issue 11543, 2019, Page(s) 219-239
DOI: 10.1007/978-3-030-22038-9_11

More efficient, provably-secure direct anonymous attestation from lattices

Author(s): Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
Published in: Future Generation Computer Systems, Issue 99, 2019, Page(s) 425-458, ISSN 0167-739X
DOI: 10.1016/j.future.2019.04.036

Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case

Author(s): Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han
Published in: IEEE Internet of Things Journal, Issue 6/6, 2019, Page(s) 10177-10190, ISSN 2327-4662
DOI: 10.1109/jiot.2019.2936532

The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

Author(s): Paulo Martins, Leonel Sousa
Published in: IEEE Access, Issue 8, 2020, Page(s) 59533-59549, ISSN 2169-3536
DOI: 10.1109/ACCESS.2020.2983020