Up

Starting-Point Resources for Suggested Project Topics

Software projects
 

  1. Educational software for a cryptographic laboratory
        - support for additional libraries
        - statistical tests for randomness

  2. Resources:

  3. Comparative analysis of software multi-precision arithmetic libraries for public key cryptography

  4. Resources:

  5. Timing attacks against public key cryptosystems

    Resources:

  6. Cache attacks against secret key cryptosystems

    Resources:

  7. Generating large primes for cryptographic applications using deterministic and probabilistic methods

    Resources:

  8. Factoring of large numbers using Number Field Sieve
        - implementing and analyzing rho, p-1, and trial division algorithms
        - precomputations, postcomputations, and test vector generation for the reconfigurable computing implementations based on SRC and COPACOBANA
        - software experiments regarding ECM, rho, p-1, and trial division algorithms

    Resources:

  9. Generation of truly random numbers with known factorization

    Resources:

  10. Implementation of selected candidates competing in the eSTREAM contest for the stream cipher standard in assembly language or Java

    Resources:

  11. Efficient implementation of Elliptic Curve Cryptosystems over binary Galois Fields, GF(2m) in polynomial bases, based on special polynomials (trinomials and pentanomials)
     

    Resources:

  12. Efficient implementation of Elliptic Curve Cryptosystems over binary Galois Fields, GF(2m) in normal bases
     

    Resources:

 

Hardware projects

  1. Implementation of selected candidates competing in the eSTREAM contest for the stream cipher standard

    Resources:

  2. Implementation of a selected new mode of operation of a secret-key cipher providing both encryption and authentication (e.g., GCM, CCM, OCB, EAX)

    Resources:

    • Milind Parelkar, Authenticated – Encryption in Hardware, MS Thesis, George Mason University, ECE Department, December 2005

  3. Critical analysis of the existing hardware implementations of AES

    Resources:

  4. Analysis of existing hardware implementations of True Random Number Generators

    Resources:

  5. Analysis of countermeasures against side-channel attacks based on power analysis

    Resources:

     

Analytical projects

  1. Evolution of protocols and products for Secure Wireless Communication: algorithms, modes of operation, key management, etc.

    Resources:

    • Jay A. Crossler, "Defensive Strategies for Establishing a Secure Wireless Network," ECE 646 project, Fall 2003 (presentation + report)

  2. Certification of cryptographic modules according to FIPS 140-2 and/or Common Criteria– case study of FPGA-based products and/or smart cards

    Resources:

  3. Survey of patents related to cryptographic algorithms and their implementations

    Resources: