Efficient Circuits and Systems for Next-Generation Cryptography in IoT
Abstract:
Hardware security has emerged as a growing concern with the advent of the Internet of Things (IoT) which consists of large networks of wireless-connected embedded devices. Although the growth of IoT has enabled novel applications, they have also become attractive targets for cyber attackers. Securing these resource-constrained embedded systems involves circuits, architectures and algorithms with low computation and storage overheads as well as countermeasures against physical attacks. One such approach is the design of efficient cryptographic hardware accelerators for IoT applications. This talk will provide an overview of design considerations and custom hardware architectures for modern public key cryptography based on lattices and elliptic curves. ASIC implementation results will be presented, along with examples of software-hardware co-design, system-level integration and demonstration of end-to-end security protocols. This talk will summarize key results and emerging directions of research in the implementation aspects of cryptography and hardware security.
Bio:
Utsav Banerjee received his B.Tech. degree in electronics and electrical communication engineering from the Indian Institute of Technology (IIT) Kharagpur in 2013, and his S.M. and Ph.D. degrees in electrical engineering and computer science from the Massachusetts Institute of Technology (MIT) in 2017 and 2021 respectively. He is currently an Assistant Professor in the Department of Electronic Systems Engineering at the Indian Institute of Science (IISc). His research interests include cryptography, hardware security, digital circuits and embedded systems. He received the President of India Gold Medal from IIT Kharagpur in 2013, the Irwin and Joan Jacobs Presidential Fellowship from MIT in 2015, the Qualcomm Innovation Fellowship in 2016, the Pratiksha Trust Young Investigator Award from IISc in 2022 and the ABB Research Award in 2022.
Number of attendees 77
Trusted Execution Environments: Keeping Secrets Safe in a Computer
Abstract:
The need to protect data stored in computers is of paramount importance. This is, however, becoming increasingly difficult with the growing threat of malware. While the number of malware is increasing at an alarming rate, the potency of malware is also becoming a concern. Malware today can inherit Operating System (OS) privileges, thus compromising the entire system and all data. Trusted Execution Environments is a means to handle this situation, where data can be kept safe even when the OS is compromised or the system software is untrusted.
This talk will introduce two Trusted Execution Environments, viz-a-viz, ARM’s Trustzone and Intel’s SGX. While the objective remains the same in both cases, the design and usage varies. The talk will dwell into these differences and discuss how the Trusted Execution Environments can be used to protect sensitive data while still having some limitations.
Bio:
Chester Rebeiro is an Associate Professor at the Indian Institute of Technology, Madras. Prior to this he was a postdoctoral researcher at Columbia University. He has a Ph.D. from IIT Kharagpur in the area of hardware security. Before joining IIT Kharagpur, he worked as a Member Technical Staff at CDAC, Bangalore. His area of interest includes security aspects in the operating system, architecture, and VLSI. He is particularly interested in applying learning algorithms and formal methods to analyze the security of systems.
Number of attendees 80