CERG Support of CAESAR

SHARCS 2012

CERG is deeply involved in CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. Members of CERG have developed the CAESAR Hardware API for authenticated ciphers, approved by the CAESAR Committee. Our group has also developed comprehensive Development Package, including VHDL and Python code common for all candidates, and the corresponding Implementer's Guide. CERG has contributed optimized high-speed RTL implementations for 24 Round 2 CAESAR Candidates and AES-GCM. Members of our team have also conducted comprehensive FPGA benchmarking of all Round 2 implementations, submitted by 14 hardware design teams from all over the world. The comprehensive rankings can be reviewed by accessing the ATHENa Database of Results. The summary of the Round 2 RTL benchmarking effort and an alternative benchmarking methodology based on High-Level Synthesis were presented at DIAC 2016. Additionally, two current members (Ice and Dr. Gaj) and one former member of CERG (Marcin) were co-authors of ICEPOLE, a high-speed, hardware-oriented Round 2 CAESAR candidate, suitable for any environment where specialized hardware (such as FPGAs or ASICs) could be used to provide high data processing rates.

Welcome to the webpage of the Cryptographic Engineering Research Group at George Mason University. Cryptography, from Greek krpto (hidden) and grapho (write), is the science and practice of hiding information. Most Internet users come in contact with cryptography when they go to a secure website of an Internet retailer. Other popular applications are secure e-mail, Internet banking, mobile phones, etc. Cryptography has its roots in mathematics, computer science and engineering. Cryptographic Engineering is concerned with all aspects of implementing cryptographic algorithms in hardware and / or software. This ranges from high performance implementations to ultra-low power implementations of public key and secret key algorithms, fault tolerant implementations, attack resistant implementation and even implementations of attacks.


Seminars:

Public Key Cryptography Using Hardware/Software Codesign for the Internet of Things

Ahmad Salman, ECE PhD Defense
Date: Wednesday, August 2nd, 1:00 PM - 3:00 PM
Location: Engineering Building, Room 3507

Embedded electronic devices and sensors are playing a major role in bridging the gap between the physical world and the virtual world. Billions of devices such as smartphones, smart watches, wearables, medical implants, and Wireless Sensor Nodes (WSN) are considered building blocks in making "The Internet Of Things" (IoT) a reality. Read More ...


Hardware-Software Codesign Approaches to Public Key Cryptosystems

Malik Umar Sharif, ECE PhD Defense
Date: Wednesday, August 2nd, 10:00 AM - 12:00 PM
Location: Engineering Building, Room 4801

If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of the Internet traffic, such as RSA, Elliptic Curve Cryptography (ECC), Digital Signature Algorithm (DSA), and Diffie-Hellman. Read More ...


A New Approach to the Development of Coprocessors for Pairing-based Cryptosystems

Rabia Shahid, ECE PhD Defense
Date: Monday, July 31st, 2:00 PM - 4:00 PM
Location: Engineering Building, Room 3507

Cryptographic engineering is a field that combines cryptology, algebraic geometry, and number theory with methods from computer arithmetic, digital system design, and computer architecture. Read More ...


Latest News:

Dr. Gaj and Dr. Kaps attended PQCrypto 2017

Dr. Gaj and Dr. Kaps attended the 8th International Conference on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, the Netherlands, June 26-28, 2017. During the Recent Result Session on June 26, chaired by Dr. Wouter Castryck, Dr. Gaj delivered a short presentation entitled "High-Speed Hardware for NTRUEncrypt-SVES: Lessons Learned", co-authored with Malik Umar Sharif. Additionally, Dr. Kaps attended a week-long Summer School on Post-Quantum Cryptography (organized by the H2020 project PQCRYPTO), and Dr. Gaj attended a two-day Executive School on Post-Quantum Cryptography (organized by the H2020 project ECRYPT-CSA). Both schools were held at the Technische Universiteit Eindhoven on June 19-23 and June 22-23, 2017, respectively. (06/29/2017)


Dr. Gaj spoke at CryptArchi 2017

Dr. Gaj spoke at the 15th International Workshop on Cryptographic Architectures Embedded in Logic Devices, CryptArchi 2017, held in Smolenice, Slovakia, on June 18-21, 2017. He delivered a talk entitled "Lessons Learned from High-Speed Implementation and Benchmarking of Two Post-Quantum Public-Key Cryptosystems," co-authored with Malik Umar Sharif and Ahmed Ferozpuri. (06/22/2017)


Dr. Gaj spoke at the Workshop on Hardware Benchmarking 2017

Dr. Gaj spoke at the Workshop on Hardware Benchmarking, held in Bochum, Germany, on June 7, 2017. He delivered an invited talk entitled "Fair and Efficient Hardware Benchmarking of Candidates in Cryptographic Contests". (06/07/2017)


Rabia Shahid spoke at RAW 2017

Rabia Shahid spoke at the 24th Reconfigurable Architecture Workshop - RAW 2017, co-located with the 31st Annual IEEE International Parallel and Distributed Processing Symposium - IEEE IPDPS 2017, held in Orlando, Florida, on May 29-June 2, 2017. She delivered a talk entitled "A Generic Approach to the Development of Coprocessors for Elliptic Curve Cryptosystems," based on the paper co-authored with Ted Winograd and Dr. Gaj. (06/01/2017)


Farnoud Farahmand earned internship at Google

Farnoud Farahmand has earned the position of the Hardware Engineer Intern at Google in Mountain View, CA, to be held between May 30 and August 25, 2017. (05/30/2017)


Ekawat Homsirikamol, Sanjay Deshpande, and Farnoud Farahmand received the 2017 Outstanding Academic Achievement Awards

CERG Members, Ekawat Homsirikamol, Sanjay Deshpande, and Farnoud Farahmand received the 2017 Outstanding Academic Achievement Awards, handed to them by the ECE Department Chair, Prof. Monson Hayes, during the ECE Convocation Reception on May 18, 2017. Here is a photo of all awardees together with their academic advisor Dr. Gaj. (05/19/2017)


William Diehl qualified to the finals of the 3M Thesis Competition

William Diehl qualified to the finals of the 3-Minute Thesis competition. The preliminary round was held on March 3, 2017, in the HUB Rooms 4 & 5. 48 GMU doctoral students entered the contest, of whom 20 were from the Volgenau School of Engineering. Each contestant had three minutes (and one Powerpoint slide) to explain his/her research to a general audience. William was the only student representing CERG. The finals were held on Saturday, March 25, at Mason's Arlington Campus. They were part of the Mason Graduate Interdisciplinary Conference. An article about the competition, with a quote from William, was written by Martha Bushong, and published in News at Mason. (03/06/2017)


Dr. Gaj's research featured in the Spring 2017 ECE Newsletter

Dr. Gaj's research has been featured in the Spring 2017 ECE Newsletter. The article about Dr. Gaj is called "Battles for Cryptographic Algorithms". (02/11/2017).


Latest publications:

Copyright Notice

The research papers below are presented here to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted on third party websites, reproduced, distributed, sold, or licensed without the explicit permission of the copyright holder.

  • F. Farahmand, E. Homsirikamol, and K. Gaj, A Zynq-based testbed for the experimental benchmarking of algorithms competing in cryptographic contests, 2016 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2016, Dec, 2016 [accepted version, pdf] [Bibtex]
  • E. Homsirikamol and K. Gaj, AEZ: Anything-but EaZy in Hardware, INDOCRYPT 2016, LNCS, Springer, Dec, 2016 [Bibtex]
  • W. Diehl and K. Gaj, Implementation of a Boolean masking scheme for the SCREAM cipher, 19th Euromicro Conference on Digital Systems Design, DSD 2016, Limassol, Cyprus, Aug. 31-Sep. 2, 2016 [Bibtex]
  • W. Diehl and K. Gaj, RTL implementations and FPGA benchmarking of three authenticated ciphers competing in CAESAR round two, 19th Euromicro Conference on Digital System Design - DSD 2016, Limassol, Cyprus, Aug. 31-Sep. 2, 2016 [Bibtex]
  • M.U. Sharif, R. Shahid, M. Rogawski, and K. Gaj, Hardware-software codesign of RSA for optimal performance vs flexibility trade-off, 26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, Aug. 29-Sep. 2, 2016 [Bibtex]
  • T. Winograd, H. Salmani, H. Mahmoodi, K. Gaj, and H. Homayoun, Hybrid STT-cmos designs for reverse-engineering prevention, ACM/IEEE 53rd Design Automation Conference, DAC 2016, Austin, TX, June 18-22, 2016 [Bibtex]
  • M. Tempelmeier, F. De, J.-P. Kaps, and G. Sigl, An area-optimized serial implementation of ICEPOLE authenticated encryption schemes, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 49–54, May, 2016 [Bibtex]
  • B. Habib and K. Gaj, A comprehensive set of schemes for PUF response generation, Applied Reconfigurable Computing, Lecture Notes in Computer Science, volume 9625, Springer International Publishing, pages 183–194, March, 2016 [Bibtex] [slides]