Opendata, web and dolomites

ESCADA SIGNED

Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 ESCADA project word cloud

Explore the words cloud of the ESCADA project. It provides you a very rough idea of what is the project "ESCADA" about.

contribution    depending    verifiable    propagation    primitives    energy    function    efficiency    encryption    permutations    holy    brakes    varieties    car    fly    technique    streams    bandwidth    software    restrict    countermeasures    asic    grail    estimate    scientific    underlying    attacks    unification    cards    polynomial    effectiveness    ciphers    reducing    authentication    contactless    modes    ways    simply    block    models    translates    heat    cryptosystems    formally    symmetric    exposure    cryptography    permit    cycles    cryptanalytic    iterating    cpu    efficient    relative    algebraic    data    body    permutation    platform    precisely    reductions    strength    ideals    preserving    affine    stone    sensors    defend    functions    byte    pseudorandom    attackers    provable    assurance    simplicity    primitive    prototypes    lower    degree    rounds    ideal    latency    round    security    rates    power    payment    stepping    channel    airbags    dual    breakthrough    dissipation    world   

Project "ESCADA" data sheet

The following table provides information about the project.

Coordinator
STICHTING KATHOLIEKE UNIVERSITEIT 

Organization address
address: GEERT GROOTEPLEIN NOORD 9
city: NIJMEGEN
postcode: 6525 EZ
website: www.radboudumc.nl

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Netherlands [NL]
 Total cost 2˙514˙071 €
 EC max contribution 2˙500˙000 € (99%)
 Programme 1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
 Code Call ERC-2017-ADG
 Funding Scheme ERC-ADG
 Starting year 2018
 Duration (year-month-day) from 2018-10-01   to  2023-09-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    STICHTING KATHOLIEKE UNIVERSITEIT NL (NIJMEGEN) coordinator 2˙500˙000.00

Map

 Project objective

The main scientific contribution of this project will be a breakthrough in the understanding of cryptanalytic and side channel attacks of symmetric cryptosystems. We will do this by a unification of attacks that will a stepping stone to the holy grail of symmetric cryptography: provable security of concrete cryptosystems. The main real-world impact is that we will build cryptosystems that are much more efficient than those used today while having the same strength. Depending on the platform, higher efficiency translates to lower energy/power (in-body sensors, contactless payment cards etc.), but also lower latency (authentication for e.g car brakes or airbags) and/or lower heat dissipation (on-the-fly encryption of high bandwidth data streams). In a software implementation it simply means less CPU cycles per byte.

We build our cryptosystems as modes, on top of block ciphers or permutations. For these primitives we adopt the classical technique of iterating a simple round function (more rounds means more security but less efficiency). We focus on round functions of algebraic degree 2. Their relative simplicity will allow a unification of all cryptanalytic attacks that exploit propagation of affine varieties and polynomial ideals (their dual) through the rounds and to precisely estimate their success rates. Moreover, we will design modes that strongly restrict the exposure of the primitive(s) to attackers and that permit security reductions to specific properties of the underlying primitive(s) in a formally verifiable way. In comparison to the classical pseudorandom and ideal permutation models, this will allow reducing the number of rounds while preserving security with high assurance. We will also study side channel attacks of our round functions and ways to defend against them. We will make ASIC prototypes and implement novel efficient countermeasures against side channel attacks and use this to evaluate their effectiveness in practice.

 Deliverables

List of deliverables.
Data Management Plan Open Research Data Pilot 2020-02-18 10:12:55

Take a look to the deliverables list in detail:  detailed list of ESCADA deliverables.

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "ESCADA" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "ESCADA" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.1.)

TechChild (2019)

Just because we can, should we? An anthropological perspective on the initiation of technology dependence to sustain a child’s life

Read More  

MITOvTOXO (2020)

Understanding how mitochondria compete with Toxoplasma for nutrients to defend the host cell

Read More  

FatVirtualBiopsy (2020)

MRI toolkit for in vivo fat virtual biopsy

Read More