1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in Software 3.Homomorphic Encryption 4.Security of GSM and 3G/4G Telephony 5.Security of Metro/Subway Cards 6.Security of Voting Machines 7.Survey of Codebreaking Machines and Projects Based on FPGAs, GPUs, Cell processors, etc. 8.Encryption Schemes for Copy Protection of Digital Media Analytical Projects
NSA-developed Cryptographic Standards time DES – Data Encryption Standard Triple DES SHA-1–Secure Hash Algorithm SHA-2 Block Ciphers Hash Functions SHA
Cryptographic Standard Contests time AES NESSIE CRYPTREC eSTREAM SHA-3 34 stream ciphers 4 SW+4 HW winners 51 hash functions 1 winner 15 block ciphers 1 winner IX.1997X.2000 I.2000XII.2002 V.2008 X.2007 XII.2012 XI.2004
4 SHA-3 Contest - NIST Evaluation Criteria Security Software Efficiency Hardware Efficiency Simplicity FPGAsASICs FlexibilityLicensing
AES Contest: Encryption time in clock cycles on various platforms Twofish team: Bruce Schneier & Doug Whiting better
6 eBACS: ECRYPT Benchmarking of Cryptographic Systems 6 measurements on multiple machines (currently over 70) each implementation is recompiled multiple times (currently over 1200 times) with various compiler options time measured in clock cycles/byte for multiple input/output sizes median, lower quartile (25 th percentile), and upper quartile (75 th percentile) reported standardized function arguments (common API) SUPERCOP - toolkit developed by D. Bernstein and T. Lange for measuring performance of cryptographic software See
7 1.Low Area Implementations of Two Selected SHA-3 Candidates and Comparison of Your Implementations with Implementations from Other Groups 2.Use of Embedded FPGA Resources (BRAMs, DSP units, etc.) in Implementations of 14 SHA-3 Candidates 3. Your ECE 545 project + extension discussed with the Instructor Hardware Projects
8 1.Optimizing Best Available Software Implementations of the SHA-3 candidates (using coding techniques, special instructions, assembly language, etc.). See 2.Comparing the sphlib 2.1 C (or Java) Implementations of Hash Functions with the Best C (or Java) Implementations Submitted to eBACS. See Porting Selected C Implementations of the SHA-3 Candidates to the TI MSP430 microcontroller or Other Microcontroller Available to You. See Software Projects