Up

Suggested Project Topics
and Related Resources - Spring 2008

Software projects

Group SW1
Extensions to Cryptool - public domain educational program for learning cryptology


Resources common for the entire group:


Suggestions for the Possible CrypTool Extensions

  1. Number Field Sieve factoring algorithm

  2. Resources:

  3. Timing attacks against public key cryptosystems

    Resources:

  1. Statistical tests for randomness

    Resources:

  1. Generating large primes for cryptographic applications using deterministic and probabilistic methods

    Resources:

  2. Generation of truly random numbers with known factorization

    Resources:

 

Group SW2
Experiments with eBATS -
eCRYPT Benchmarking of AsymmeTric Systems


Resources common for the entire group:


Suggestions for the Possible Projects Involving eBATS
 

  1. Comparative analysis of software multi-precision arithmetic libraries for public key cryptography

  2. Resources:

  3. Developing eBATS based on the new ECC library developed at GMU as a part of ECE 746 in Fall 2006 - ECClib

Resources:

  1. Extending eBATs to support new emerging class of public key cryptosystems called pairing-based cryptosystems

Resources:

Hardware projects

Group HW1
Comparative Analysis of Various Hardware Architectures of AES


Resources common for the entire group:


Suggestions for the Possible Project Topics

  1. S-box vs. T-box based iterative architecture of AES

    Resources:

  2. Fully pipelined implementations of AES with a speed exceeding 20 Gbit/s with S-boxes implemented using logic only (instead of look-up tables)

    Resources:

  3. Compact architectures of AES with a data path width equal to 8-bits, 32-bits, 64-bits, 128-bits

    Resources:

     

Group HW2
eBATS for FPGA-based platforms


Resources common for the entire group:

 

  1. Block cipher eBATS for Xilinx or Altera FPGAs

Resources:

  1. Stream cipher eBATS for Xilinx or Altera FPGAs

Resources:

Analytical projects

Group AN

  1. Analysis of various proposed designs for True Random Number Generators

    Resources:

  2. Analysis of countermeasures against side-channel attacks based on power analysis

    Resources:

  3. Certification of cryptographic modules according to FIPS 140-2 and/or Common Criteria– case study of FPGA-based products and/or smart cards

    Resources:

  4. Survey of patents related to cryptographic algorithms and their implementations, with the special focus on ECC-related patents

    Resources:

  5. Cache attacks against secret key cryptosystems and analysis of effectiveness of all known countermeasures

    Resources: