SHARCS 2012 in Washington D.C.

SHARCS 2012

CERG was an organizer of SHARCS 2012 - Special-Purpose Hardware for Attacking Cryptographic Systems workshop held in the Washington Marriott Hotel on March 17-18, 2012. Dr. Kaps served as a general chair of the workshop, and Dr. Gaj was one of the two co-chairs. Graduate students from CERG provided technical and logistic support during the event. This edition of SHARCS had more than 70 participants from 19 countries of 5 continents. The slides of all presentations and the workshop record are posted on the SHARCS 2012 website. An extensive record of the entire series, including all slides and papers from the previous workshops, is available at http://sharcs.org. (3/19/12)

Welcome to the webpage of the Cryptographic Engineering Research Group at George Mason University. Cryptography, from Greek krpto (hidden) and grapho (write), is the science and practice of hiding information. Most Internet users come in contact with cryptography when they go to a secure website of an Internet retailer. Other popular applications are secure e-mail, Internet banking, mobile phones, etc. Cryptography has its roots in mathematics, computer science and engineering. Cryptographic Engineering is concerned with all aspects of implementing cryptographic algorithms in hardware and / or software. This ranges from high performance implementations to ultra-low power implementations of public key and secret key algorithms, fault tolerant implementations, attack resistant implementation and even implementations of attacks.


Seminars:

Trends in Network Steganography

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Date: Monday, October 6th, 4:00 PM - 5:00 PM
Location: Engineering Building, Room 3507

Network steganography is the youngest branch of information hiding. It is a fast-developing field: recent years have resulted in multiple new information hiding methods, which can be exploited in various types of networks. The exploitation of protocols belonging to the Open Systems Interconnection (OSI) reference model is the essence of network steganography. This family of methods may utilize one or more protocols simultaneously or the relationships between them — relying on the modification of their intrinsic properties for the embedding of steganograms.

Network steganography is on the rise because embedding secret data into digital media files (old school of information hiding) has been found to possess two serious drawbacks: it permits hiding only a limited amount of data per one file and the modified picture may be accessible for forensics experts (for example, because it was uploaded to some kind of server). Network-level embedding changes the state of things diametrically; it allows for leakage of information (even very slow) during long periods of time and, if all the exchanged traffic is not captured, then there is nothing left for forensics experts to analyze. As a result, such methods are more difficult to detect and eliminate from networks.

The talk will give a general overview in this area and will be a chance to present algorithms proposed by Network Security Group (secgroup.pl) from Warsaw University of Technology, Poland. (Full Announcement)


Latest News:

Dr. Gaj spoke at FPL 2014

Dr. Gaj spoke at the 24th International Conference on Field Programmable Logic and Applications, FPL 2014, held in Munich, Germany, on September 2-4, 2014. Dr. Gaj gave a talk entitled "A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs". (09/04/2014)


Visitor from Warsaw University of Technology in Poland

In September and October 2014, CERG is hosting a visiting professor from Warsaw University of Technology in Poland, Prof. Krzysztof (Kris) Szczypiorski. Prof. Szczypiorski is the founder of Network Security Group at WUT and stegano.net project focused on network steganography and steganalysis. He is the author or the co-author of 180+ publications including 130+ papers and 50+ invited talks. During his visit at GMU, Prof. Szczypiorski will give research seminars, and establish close collaboration on research and education with multiple faculty members and students from the Volgenau School of Engineering (09/01/2014)


Dr. Gaj and Dr. Kaps spoke at DIAC 2014

Dr. Gaj and Dr. Kaps spoke at the DIAC 2014: Directions in Authenticated Ciphers workshop, held in Santa Barbara on August 23-24, 2014. Dr. Gaj gave a talk entitled "Benchmarking of Cryptographic Algorithms in Hardware" and Dr. Kaps gave a presentation entitled "Keccak and AES in FPGAs". (08/18/2014)


Dr. Gaj serves as a co-chair of the special track at ReConFig 2014

Dr. Gaj and Dr. Tim Güneysu from Ruhr University Bochum, Germany, are co-chairs of the special track on Reconfigurable Computing for Security and Cryptography at the 2014 International Conference on ReConFigurable Computing and FPGAs, ReConFig 2014, to be held in Cancun, Mexico, on Dec. 8-10, 2014. (08/18/2014)


Dr. Gaj and Dr. Kaps spoke at CryptArchi 2014

Dr. Gaj and Dr. Kaps attended the 12th CryptArchi workshop on cryptographic architectures embedded in reconfigurable devices, held in Annecy, France on June 29-July 2, 2014. Dr. Gaj gave a talk entitled "Hardware-Software Codesign of Pairing-Based Cryptosystems for Optimal Performance vs. Flexibility Trade-off" and Dr. Kaps gave a presentation entitled "Multi-Purpose Keccak for Modern FPGAs". (07/03/2014)


Kris Gaj and Jens-Peter Kaps Receive Funding from McQ Inc. and Missile Defense Agency

Dr. Gaj and Dr. Kaps received $35K from McQ Inc. and the Missile Defense Agency for their project, "Physical Unclonable Functions (PUFS) for Unique and Robust Encryption Key Generation." (05/12/2014)


Dr. Gaj is a member of the Program Committees of CHES 2014, HASP 2014, IICPS 2014, and LightSec 2014

Dr. Gaj is a member of the Program Committees for the following workshops:

Majority of student members of CERG have contributed their time and expertise serving as sub-reviewers for the aforementioned workshops.(04/07/2014)


Dr. Kaps is a member of the Program Committee of DSD-AHSA 2014 and LightSec 2014

Dr. Kaps serves as a member of the Program Committee of:

Majority of student members of CERG have contributed their time and expertise serving as sub-reviewers for the aforementioned workshops.(04/06/2014)


Dr. Gaj gave a keynote speech at CANSec 2014

Dr. Gaj gave a keynote speech, entitled Battles of Cryptographic Algorithms: From AES to CAESAR in Software & Hardware, at the Fifth Central Area Networking and Security Workshop - CANSec 2014, hosted by University of Arkansas on April 4-5, 2014. (04/05/2014)


Latest Publications:

Copyright Notice

The research papers below are presented here to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted on third party websites, reproduced, distributed, sold, or licensed without the explicit permission of the copyright holder.

  • B. Habib, K. Gaj, and J.-P. Kaps, FPGA PUF based on programmable LUT delays, 2013 Euromicro Conference on Digital System Design (DSD), pages 697–704, 2013 [accepted version, pdf] [Bibtex]
  • R. Velegalati, K. Shah, and J.-P. Kaps, Glitch detection in hardware implementations on FPGAs using delay based sampling techniques, 2013 Euromicro Conference on Digital System Design (DSD), pages 947–954, 2013 [Bibtex]
  • M. Rogawski, K. Gaj, and E. Homsirikamol, A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grostl, Microprocessors and Microsystems, volume 37, number 6-7, pages 572-582, 2013 [Bibtex]
  • R. Velegalati and J.-P. Kaps, Towards a Flexible, Opensource BOard for Side-channel analysis (FOBOS), June, 2013, Cryptographic architectures embedded in reconfigurable devices, CRYPTARCHI 2013 [pdf] [Bibtex]
  • B. Brewster, E. Homsirikamol, R. Velegalati, and K. Gaj, Option Space Exploration Using Distributed Computing for Efficient Benchmarking of FPGA Cryptographic Modules, 2012 International Conference on Field Programmable Technology - FPT, Dec, 2012 [Bibtex]
  • S. Paul, E. Homsirikamol, and K. Gaj, A Novel Permutation-based Hash Mode of Operation FP and The Hash Function SAMOSA, 13th International Conference on Cryptology in India - Indocrypt, Dec, 2012 [Bibtex]
  • M. Rogawski and K. Gaj, A High-Speed Unified Hardware Architecture for AES and the SHA-3 Candidate Grostl, 15th EUROMICRO Conference on Digital System Design – DSD 12, 2012 [Bibtex]
  • K. Gaj, E. Homsirikamol, M. Rogawski, R. Shahid, and M.U. Sharif, Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs, Jun., 2012 [Bibtex]
  • R. Velegalati and J.-P. Kaps, Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis, May, 2012, Work in Progress (WiP), Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012 [pdf] [Bibtex]
  • C. Wenzel-Benner, J. Gr"af, J. Pham, and J.-P. Kaps, XBX benchmarking results January 2012, Mar, 2012 [pdf] [Bibtex] Third {SHA-3} candidate conference
  • J.-P. Kaps, P. Yalla, K.K. Surapathi, B. Habib, S. Vadlamudi, and S. Gurung, Lightweight implementations of SHA-3 finalists on FPGAs, Mar, 2012 [pdf] [Bibtex] Third {SHA-3} candidate conference
  • K. Gaj, E. Homsirikamol, M. Rogawski, R. Shahid, and M.U. Sharif, Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs, Mar, 2012 [Bibtex] Third {SHA-3} candidate conference
  • F.K. G"urkaynak, K. Gaj, B. Muheim, E. Homsirikamol, C. Keller, M. Rogawski, H. Kaeslin, and J.-P. Kaps, Lessons learned from designing a 65nm ASIC for evaluating third round SHA-3 candidates, Mar, 2012 [pdf] [Bibtex] Third {SHA-3} candidate conference