How to do cryptography if your hardware is not trusted

Staff - Faculty of Informatics

Start date: 15 June 2010

End date: 16 June 2010

The Faculty of Informatics is pleased to announce a seminar given by Stefan Dziembowski

DATE: Tuesday, June 15th 2010
PLACE: USI Università della Svizzera italiana, room SI-008, Informatics building (Via G. Buffi 13)
TIME: 09.30

ABSTRACT:
In this talk I will give an overview of my current research area.  Its main goal is to design cryptographic schemes that are secure even if they are implemented on hardware that is not fully trusted.  This is motivated by the fact that most of the real-life attacks on cryptographic devices do not break their mathematical foundations, but exploit vulnerabilities in their implementations.  The long-term goal of this research is to provide countermeasures against these attacks.

Very generally, the attacks that we consider can be classified into following two categories: (1) the passive attacks, where the adversary breaks the scheme by observing the side-channel information, and (2) the active attacks where the adversary can also tamper with the device.  I will give a survey of the recent countermeasures against both types of attacks focusing on the work in the papers listed below.

References
========
Francesco Davì and Stefan Dziembowski and Daniele Venturi Leakage-Resilient Storage 7th Conference on Security and Cryptography for Networks (SCN) 2010
Stefan Dziembowski, Daniel Wichs and Krzysztof Pietrzak Non-Malleable Codes Innovations in Computer Science (ICS) 2010
Stefan Dziembowski and Krzysztof Pietrzak Leakage-Resilient Cryptography in the Standard Model 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS)  2008
Stefan Dziembowski and Krzysztof Pietrzak Intrusion-Resilient Secret Sharing 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS) 2007

BIO:
Stefan Dziembowski  is an assistant professor at the University of Rome La Sapienza. He is interested in theoretical and applied cryptography.

Dziembowski received his MSc degree in computer science in 1996 from the Warsaw University, and his PhD degree in computer science in 2001 from the University of Aarhus, Denmark. Then, he spent 18 months as a post-doctoral fellow at the Swiss Federal Institute of Technology (ETH), Zurich. Afterwards, for 3 years he was an assistant professor at the Warsaw University. Later he spent 9 months as a post-doc at CNR Pisa, and 18 months as a post-doc at the University of Rome La Sapienza.

His papers appeared at leading scientific conferences (FOCS, STOC, CRYPTO, EUROCRYPT, TCC, LICS), and journals (Journal of Cryptology and IEEE Transactions on Information Theory).  He also served as a PC member of several international conferences, including EUROCRYPT, ASIACRYPT, Theoretical Cryptography Conference (TCC), and the International Colloquium on Automata, Languages and Programming (ICALP).

He is a winner of the ERC Starting Independent Researcher Grant competition (in 2008) and a recipient of the Marie-Curie Intra-European Fellowship (2006-2007). He was also awarded the scholarship for young researchers from Foundation for Polish Science (2003-2004).

HOST: Prof. Mauro Pezzè