PhD Studentship: Security Proofs of Practical Cryptosystems

The security of a modern cryptographic construction is proved via a reduction from the hardness of solving some well-studied mathematical problems. There is, however, a substantial gap between security proved in theory and security achieved in practice.

In general theoretical analysis, the integrity of algorithms and the secrecy of the keys are always assumed to hold. In fact, guarantees of semantic security of many popular and widely deployed cryptosystems may break down if the adversary sees encryptions of the secret key.

In practice, on the other hand, the algorithms may be tampered with to modify a few bits of the keys, commonly known as the related-key attacks, or to leak encryptions of (some function of) the secret key, commonly known as the key-dependent message attacks. The adversary may even tamper with the algorithms in such a way that a small fraction of outputs is subverted, a generalisation of the kleptographic attacks. A line of work has considered the security of cryptosystems in the presence of such key-dependent messages or subverted algorithms. However, practical and deployable cryptographic solutions against such active attacks are still missing for many fundamental problems.

The objective of the project is to analyse the security of deployed cryptosystems along with designing new ones that can withstand key-correlated attacks and general kleptographic attacks. In particular, we wish to address the following.

  • Efficient and secure authentication mechanisms against key-correlated and misuse-resistant attacks. The project will analyse deployed and standardised MAC (message authentication code) algorithms and authenticated encryptions in the light of simultaneous related-key and key-dependent message attacks.
  • Design principles of key encapsulation mechanisms resisting kleptographic attack. Recent kleptographic attacks against the key encapsulation mechanisms have shown a significant vulnerability of the hybrid encryption protocols. We shall explore whether the widely deployed Fujisaki-Okamoto transformation could be salvaged to achieve security against such kleptographic attacks.
  • Secure modes of operation of hash functions and block ciphers resisting kleptographic attack. Security of modes of operations of hash functions and block ciphers often require the underlying primitive to behave like a random function or a random permutation. We shall analyse the security of these modes when the underlying primitives are modified via a kleptographic attack.
  • Eligibility: First or Upper Second Class Honours undergraduate degree and/or postgraduate degree with Distinction (or an international equivalent). We also consider applicants from diverse backgrounds that have provided them with equally rich relevant experience and knowledge. Full-time and part-time study modes are available.

    The candidate is expected to have a postgraduate degree or equivalent, and strong background in Theoretical Computer Science and Mathematics. Experience in Cryptography is beneficial.

    The position offered is for three and a half years full-time study. The current (2022-23) value of the award is stipend; £17,668 pa; tuition fee: £4,596 pa. Awards are usually incremented on 1 October each following year.

    View or Apply
    To help us track our recruitment effort, please indicate in your cover/motivation letter where (jobs-near-me.eu) you saw this job posting.

    Share

    Recent Posts

    Communications Specialist

    Synopsis of the Role A fantastic opportunity for a Communications Specialist to join the Corporate…

    3 hours ago

    Assistant/Associate Professor in Secondary Social Studies Education and Teacher Education

    Job Title Assistant/Associate Professor in Secondary Social Studies Education and Teacher Education Job Description Summary,…

    3 hours ago

    Adjunct Faculty – Art Education, Teacher Education, Department of Content Area Teacher Education (CATE)

    Adjunct Faculty - Art Education, Teacher Education, Department of Content Area Teacher Education (CATE) Adjunct…

    3 hours ago

    Assistant/Associate Professor Education and Special Education Programs, Early Childhood Education and Special Education (Birth-Grade 2)

    Overview The Assistant/Associate Professor is a full-time faculty member with all the duties and responsibilities…

    3 hours ago

    Senior Engineering Manager, Infrastructure

    JOB DESCRIPTION MZLA Technologies Corporation (MZLA) is a wholly owned, for-profit subsidiary of the Mozilla…

    18 hours ago

    AE – Brand Ambassador (Sales Associate)

    YOUR ROLE As a part-time Brand Ambassador, you bring our brand to life every day!…

    23 hours ago
    For Apply Button. Please use Non-Amp Version

    This website uses cookies.