Cyber and Physical Security Cryptographic Engineering

About:

Cyber-physical (CPS) systems are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. They provide functionality to infrastructure systems in aviation, automotive, rail, healthcare, telephony and network, utilities and electrical power generation and distribution. Most cyber-physical system components—particularly those of critical nature—are networked using wireless and wired communication networks, embedded processors, sensors and actuators. They interact with humans and the rest of the physical world, deliver critical real-time data, and support guaranteed performance. Cyber-physical systems can provide much richer functionality, efficiency, autonomy and reliability than manually controlled and loosely coupled systems. However, they also create inherent vulnerabilities related to privacy, security, robustness and reliability of the underlying components and as a whole system. Because CPS can be significantly faster than humans or they can control and coordinate large-scale systems (such as the electrical grid), security and reliability issues are critically important.

In the coming years, cryptography will become integral to CPS; from the controller of a braking system, to server and client computers, to handheld, portable, and wireless devices, all interacting devices will have to be capable of encrypting and decrypting or signing and verifying messages. That is to say, without exception, all networked computers and devices must have cryptographic layers implemented, and must be able to access cryptographic functions in order to provide security features. In this context, efficient (in terms of time, area, and power consumption) hardware structures will have to be designed, implemented, and deployed. Furthermore, general-purpose (platform-independent) as well as special-purpose software implementing cryptographic functions on embedded devices are needed. An additional challenge is that these implementations should be done in such a way to resist cryptanalytic attacks launched against them by adversaries having access to primary (communication) and secondary (timing, power, electromagnetic, acoustic) channels .

Research Group Director:
Prof. Dr. Çetin Kaya Koç

Group Members:
Assist. Prof. Dr. Enver Özdemir
İhsan Çiçek
İsmail San
Mustafa Parlak