or
Looking to list your PhD opportunities? Log in here.
The security of a modern cryptographic construction is proved via a reduction from the hardness of solving some well-studied mathematical problems. There is, however, a substantial gap between security proved in theory and security achieved in practice. In general theoretical analysis, the integrity of algorithms and the secrecy of the keys are always assumed to hold. In fact, guarantees of semantic security of many popular and widely deployed cryptosystems may break down if the adversary sees encryptions of the secret key. In practice, on the other hand, the algorithms may be tampered with to modify a few bits of the keys, commonly known as the related-key attacks, or to leak encryptions of (some function of) the secret key, commonly known as the key-dependent message attacks. The adversary may even tamper with the algorithms in such a way that a small fraction of outputs is subverted, a generalisation of the kleptographic attacks. A line of work has considered the security of cryptosystems in the presence of such key-dependent messages or subverted algorithms. However, practical and deployable cryptographic solutions against such active attacks are still missing for many fundamental problems.
The objective of the project is to analyse the security of deployed cryptosystems along with designing new ones that can withstand key-correlated attacks and general kleptographic attacks. In particular, we wish to address the following.
1. Efficient and secure authentication mechanisms against key-correlated and misuse-resistant attacks. The project will analyse deployed and standardised MAC (message authentication code) algorithms and authenticated encryptions in the light of simultaneous related-key and key-dependent message attacks.
2. Design principles of key encapsulation mechanisms resisting kleptographic attack. Recent kleptographic attacks against the key encapsulation mechanisms have shown a significant vulnerability of the hybrid encryption protocols. We shall explore whether the widely deployed Fujisaki-Okamoto transformation could be salvaged to achieve security against such kleptographic attacks.
3. Secure modes of operation of hash functions and block ciphers resisting kleptographic attack. Security of modes of operations of hash functions and block ciphers often require the underlying primitive to behave like a random function or a random permutation. We shall analyse the security of these modes when the underlying primitives are modified via a kleptographic attack.
The university will respond to you directly. You will have a FindAPhD account to view your sent enquiries and receive email alerts with new PhD opportunities and guidance to help you choose the right programme.
Log in to save time sending your enquiry and view previously sent enquiries
The information you submit to University of Birmingham will only be used by them or their data partners to deal with your enquiry, according to their privacy notice. For more information on how we use and store your data, please read our privacy statement.
Research output data provided by the Research Excellence Framework (REF)
Click here to see the results for all UK universitiesBased on your current searches we recommend the following search filters.
Check out our other PhDs in Birmingham, United Kingdom
Start a New search with our database of over 4,000 PhDs
Based on your current search criteria we thought you might be interested in these.
Disasters and the role of community resilience
Kingston University
Enhance the resilience of the UK gas networks to meet the future challenges
University of Sheffield
A Societal Index Model for the Assessment of the Safety, Operability and Resilience level of Regional Mini Energy Grid
University of Sheffield