  {"id":15,"date":"2020-04-20T15:59:50","date_gmt":"2020-04-20T19:59:50","guid":{"rendered":"https:\/\/carleton.ca\/mtaha\/?page_id=15"},"modified":"2020-04-21T13:04:16","modified_gmt":"2020-04-21T17:04:16","slug":"research","status":"publish","type":"page","link":"https:\/\/carleton.ca\/mtaha\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<h3 id=\"sites-page-title-header\" align=\"left\"><span id=\"sites-page-title\" dir=\"ltr\" tabindex=\"-1\">Research<\/span><\/h3>\n<div id=\"sites-canvas-main\" class=\"sites-canvas-main\">\n<div id=\"sites-canvas-main-content\">\n<table class=\"sites-layout-name-one-column sites-layout-hbox\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td class=\"sites-layout-tile sites-tile-name-content-1\">\n<div dir=\"ltr\">\n<div>\n<div><\/div>\n<h3><a name=\"TOC-Research-Context:\"><\/a>Research Context:<\/h3>\n<p>As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT) and smart infrastructure, developing security-aware designs became a vital research area. These systems are not only highly-constrained design environments, but are also vulnerable to implementation attacks. Implementation attacks are practical attacks that target the underlying implementation of a cryptographic algorithm rather than its mathematical foundation. The power consumption, electromagnetic radiation, execution time and response to injected faults are side-channel outputs that can leak information about the internal secret key, an attack that is commonly called Side-Channel Analysis (SCA). SCA is a passive, noninvasive attack that can not be detected by the underlying system (other than fault injection, which is active) and can break an AES implementation after a single execution.\u00a0 For instance, an adversary can apply SCA over a legitimate sensor or control unit that he owns in order to reveal the secret key used for communication. Then, he can put this sensor in a target system in order to cause physical damage.<\/p>\n<h4><a name=\"TOC-Summary:-My-research-seeks-a-deeper-and-more-quantified-understanding-of-implementation-attacks-against-critical-IoT-systems-and-proposes-novel-security-aware-designs-that-are-protected-against-these-attacks-without-violating-usability-cost-or-real-time-co\"><\/a><i>Summary: My research seeks a deeper and more quantified understanding of implementation attacks against critical IoT systems and proposes novel, security-aware designs that are protected against these attacks without violating usability, cost or real-time constraints.<\/i><\/h4>\n<\/div>\n<h2><a name=\"TOC-LR-Keymill:-a-new-crypto-structures-with-inherent-security-against-SCA\"><\/a><b>LR-Keymill: a new crypto structures with inherent security against SCA<\/b><\/h2>\n<div>\n<div>\n<div>\n<div><a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/research\/Keymill_2.png?attredirects=0\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/_\/rsrc\/1498754712528\/research\/Keymill_2.png?height=400&amp;width=387\" width=\"387\" height=\"400\" border=\"0\" \/><\/a><\/div>\n<p>In the crypto community, it is widely acknowledged that any cryptographic scheme that is built with no special countermeasure against side-channel attacks (SCA) can be easily broken. Our new research challenges this intuition. Lets introduce LR-Keymill.<\/p>\n<p>LR-Keymill, or Leakage Resilient Keymill, is an SCA-secured keystream generator. It accepts 128-bits of secret key and 128-bits of Initialization Vector (IV) to generate a pseudorandom binary output stream of any length. LR-Keymill consists of four NLFSRs where the feedback functions are connected together through a rotating cross-connect, as shown in the figure. The rotating cross-connect mixes the feedback functions, so that, the internal state of any register depends on the internal state of all the other register. More details about LR-Keymill can be found in these two papers, <a href=\"http:\/\/eprint.iacr.org\/2016\/710\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a> and <a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7951798\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n<p>LR-Keymill is secured against passive SCA attacks without incorporating any special SCA countermeasures. The reason for this claim is that (very briefly), for every secret key, there is a large set of other keys that generate the exact same power signature, mandating a post-attack search phase with large time-complexity. On average, the required time-complexity after an SCA attack against the LR-Keymill is 67.9 bits. This time-complexity exceeds the birthday-boundary of AES (64 bits), and is considered safe for practical applications.<\/p>\n<\/div>\n<div>More details and the security proofs can be found <a href=\"http:\/\/eprint.iacr.org\/2016\/710\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a> and <a href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7951798\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/div>\n<div>\n<h2><a name=\"TOC-Previous-Work\"><\/a>Previous Work<\/h2>\n<p>Some of my previous research can be captured in this diagram:<\/p>\n<div><a href=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/research\/My_Work.png?attredirects=0\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/sites.google.com\/a\/vt.edu\/mtaha\/_\/rsrc\/1498763274279\/research\/My_Work.png?height=263&amp;width=400\" width=\"400\" height=\"263\" border=\"0\" \/><\/a><\/div>\n<div><\/div>\n<div><\/div>\n<\/div>\n<div>\n<h3><a name=\"TOC-Attacking-Block-Ciphers:\"><\/a> Attacking Block-Ciphers:<\/h3>\n<ul>\n<li><u>Power Attacks:<\/u> We exploited the power consumption of a parallel AES core on SASEBO-GII, and the results were presented at ICCD&#8217;12. Also, we exploited the smallest implementation of Simon, and the results were presented at HOST&#8217;15.<\/li>\n<li><u>Electromagnetic Attacks:<\/u> We expolited the electromagnetic leakage of an AES core on Nios-II processor. The results were presented at FPL&#8217;12.<\/li>\n<li><u>Fault Attacks:<\/u> We proposed a new concept for mounting Differential Fault Attacks. This attack combines the principles of Differential Power Analysis with Fault Injection attacks. The results were presented at FDTC&#8217;14.<br \/>\nThis paper was cited 82 times and later lead to a <b>$307K NSF project<\/b> \u2018<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1441710\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FAME: Fault-attack Awareness using Microprocessor Enhancements<\/a>\u2019, Award Number: 1441710, PI: P. Schaumont.<\/li>\n<\/ul>\n<h3><a name=\"TOC-Protecting-Block-Ciphers:\"><\/a>Protecting Block-Ciphers:<\/h3>\n<ul>\n<li><u>Hiding:<\/u> We designed a set of balanced custom instructions to prevent the electromagnetic leakage of AES on Nios-II processor. The results were presented at FPL&#8217;12.<\/li>\n<li><u>Masking:<\/u>\n<ol>\n<li>We proposed a provably-secure masking scheme of the new NSA block cipher Simon. This design is the smallest SCA-secure block cipher to date. Results were presented in HOST&#8217;15 and IEEE-TC&#8217;17.<\/li>\n<li>We also proposed a provably-secure masking scheme of the other NSA block cipher Speck. This design was presented in CARDIS&#8217;16<\/li>\n<li>We proposed a new method to estimate the information leakage of an embedded system right from the software code. The results of this research were presented at DAC&#8217;14 and IEEE-TCAD. These papers were cited 62 times and later lead to a <b>$500K NSF project<\/b> \u2018<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1617203\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Secure by Construction: An Automated Approach to Comprehensive Side Channel Resistance<\/a>\u2019, Award Number: 1617203, PI: P. Schaumont.<\/li>\n<\/ol>\n<\/li>\n<li><u>Leakage Resiliency:<\/u> We proposed a framework for practical leakage resiliency, with two solutions for AES. The results were accepted at DIAC&#8217;13 and IEEE-TIFS.<\/li>\n<\/ul>\n<h3><a name=\"TOC-Attacking-Hashing-Functions:\"><\/a>Attacking Hashing Functions:<\/h3>\n<\/div>\n<div>\n<ul>\n<li><u>Power Attacks:<\/u> We were the first people to exploited Keccak, the new SHA-3 hashing standard running on both Microblaze processor and a 0.13<span style=\"font-family: symbol;\">m<\/span>m ASIC chip. Results of this project were presented at HOST&#8217;13, and IWSEC&#8217;13.<br \/>\nThese papers were cited 58 times, and were part of a big <b>$1,5M NIST project<\/b>, &#8220;<a href=\"https:\/\/www.nist.gov\/director\/chief-staff\/program-coordination-office\/project-brief-george-mason-university\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Environment for Fair and Comprehensive Performance Evaluation of Cryptographic Hardware and Software<\/a>&#8220;.<\/li>\n<\/ul>\n<h3><a name=\"TOC-Protecting-Hashing-Functions:\"><\/a>Protecting Hashing Functions:<\/h3>\n<ul>\n<li><u>Leakage Resiliency:<\/u> We developed a lightweight secure core for all the keyed and unkeyed applications of SHA-3. Results of this project were presented at HOST&#8217;14.<br \/>\nThis paper was part of a <b>$437K NSF project<\/b>, &#8216;<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1115839\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">New Directions in Side Channel Attacks and Countermeasures<\/a>,&#8217; Award Number: 1115839.<\/li>\n<\/ul>\n<h2><a name=\"TOC-MSc-Research:\"><\/a> <b>MSc Research<\/b>:<\/h2>\n<p>During the MSc degree, we proposed a reliable broadcasting protocol for life-safety messages in Vehicular Ad-Hoc Networks (VANETs). Results of this research were presented in ISSPIT&#8217;07 and VTC&#8217;08.<\/p>\n<\/div>\n<div>My MSc research was cited more than 99 times.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Research Research Context: As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT) and smart infrastructure, developing security-aware designs became a vital research area. These systems are not only highly-constrained design environments, but are also vulnerable to implementation attacks. Implementation attacks are practical attacks that target the underlying implementation of [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Research - Mostafa Taha<\/title>\n<meta name=\"description\" content=\"Research Research Context: As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/mtaha\/research\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/research\/\",\"url\":\"https:\/\/carleton.ca\/mtaha\/research\/\",\"name\":\"Research - Mostafa Taha\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\"},\"datePublished\":\"2020-04-20T19:59:50+00:00\",\"dateModified\":\"2020-04-21T17:04:16+00:00\",\"description\":\"Research Research Context: As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT)\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/mtaha\/research\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/mtaha\/research\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/research\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/mtaha\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/mtaha\/#website\",\"url\":\"https:\/\/carleton.ca\/mtaha\/\",\"name\":\"Mostafa Taha\",\"description\":\"ÐÓ°ÉÔ­´´ University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research - Mostafa Taha","description":"Research Research Context: As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/mtaha\/research\/","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/mtaha\/research\/","url":"https:\/\/carleton.ca\/mtaha\/research\/","name":"Research - Mostafa Taha","isPartOf":{"@id":"https:\/\/carleton.ca\/mtaha\/#website"},"datePublished":"2020-04-20T19:59:50+00:00","dateModified":"2020-04-21T17:04:16+00:00","description":"Research Research Context: As embedded systems are being massively deployed in the automotive industry, intelligent healthcare, Internet-of-Things (IoT)","breadcrumb":{"@id":"https:\/\/carleton.ca\/mtaha\/research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/mtaha\/research\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/mtaha\/research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/mtaha\/"},{"@type":"ListItem","position":2,"name":"Research"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/mtaha\/#website","url":"https:\/\/carleton.ca\/mtaha\/","name":"Mostafa Taha","description":"ÐÓ°ÉÔ­´´ University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/mtaha\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/15"}],"collection":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":37,"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/pages\/15\/revisions\/37"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/mtaha\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}