Skip to content
GCC AI Research

Search

Results for "crypto-devices"

CRC Seminar Series - Jose Maria Bermudo Mera

TII ·

The National Institute of Standards and Technology (NIST) has been evaluating Post-Quantum Cryptography proposals since 2017. Lattice-based schemes have emerged as efficient candidates for Key Encapsulation Mechanisms (KEM) and Digital Signatures. This talk will cover the core operations within lattice-based schemes and efficient implementation strategies. Why it matters: As quantum computing advances, exploring and standardizing post-quantum cryptography is crucial for maintaining secure communication and data protection in the future.

How will our cryptographic toolkit be Impacted by quantum computers and Machine Learning?

MBZUAI ·

Dr. Najwa Aaraj from MBZUAI and TII discussed the impact of quantum computers and machine learning on cryptographic algorithms. The talk covered post-quantum cryptographic (PQC) schemes, standardization efforts, and the role of machine learning in advancing cybersecurity solutions. Dr. Aaraj also highlighted the challenges of transitioning current cryptographic systems to quantum-resistant alternatives. Why it matters: As quantum computing advances, understanding and implementing post-quantum cryptography is crucial for maintaining secure communications and data protection in the UAE and globally.

CRC Seminar Series - Prof. Daniel Panario

TII ·

Prof. Daniel Panario gave a seminar on irreducible polynomials over finite fields and their applications in cryptography. The seminar covered how finite fields are used as basic components in many cryptographic applications. It surveyed families of irreducible polynomials and commented on their properties. Why it matters: The talk highlights the mathematical foundations and ongoing research relevant to cryptographic implementations in the region.

TII Appoints Global Cryptography Leaders to the Board of Advisors at the Cryptography Research Center

TII ·

The Technology Innovation Institute's Cryptography Research Center (CRC) in Abu Dhabi has appointed a Board of Advisors comprised of global cryptography experts. The board includes Prof. Joan Daemen, Prof. Lejla Batina, Dr. Guido Bertoni, Prof. Carlos Aguilar, Prof. Damien Stehlé, and Prof. Tim Güneysu. The advisors will guide CRC's research efforts in areas like post-quantum cryptography and hardware-based cryptography. Why it matters: This move strengthens the UAE's position as a global hub for cryptography research and development, fostering innovation in this critical field.

CRC Seminar Series - Cristofaro Mune, Niek Timmers

TII ·

Cristofaro Mune and Niek Timmers presented a seminar on bypassing unbreakable crypto using fault injection on Espressif ESP32 chips. The presentation detailed how the hardware-based Encrypted Secure Boot implementation of the ESP32 SoC was bypassed using a single EM glitch, without knowing the decryption key. This attack exploited multiple hardware vulnerabilities, enabling arbitrary code execution and extraction of plain-text data from external flash. Why it matters: The research highlights critical security vulnerabilities in embedded systems and the potential for fault injection attacks to bypass secure boot mechanisms, necessitating stronger hardware-level security measures.

Technology Innovation Institute’s Cryptography Research Center Launches CLAASP Cryptanalysis Tool

TII ·

The Technology Innovation Institute's (TII) Cryptography Research Center (CRC) has launched CLAASP, a cryptographic library for the automated analysis of symmetric primitives. CLAASP, built on SageMath and Python3, automates the design analysis of block ciphers, cryptographic permutations, hash functions, and stream ciphers. Released as an open-source tool with a GPLv3 license, CLAASP aims to ensure design sovereignty for organizations creating symmetric ciphers. Why it matters: This tool provides an important resource for the region to strengthen its cryptographic capabilities and contribute to global efforts in safeguarding digital infrastructure against evolving threats, including quantum computing.

Hard to crack hardware

KAUST ·

KAUST researchers have designed an integrated circuit logic lock to protect electronic devices from cyberattacks. The protective logic locks are based on spintronics and can be incorporated into electronic chips. The lock uses a magnetic tunnel junction (MTJ) where the keys are stored in tamper-proof memory, ensuring hardware security. Why it matters: This hardware-based security feature could significantly increase confidence in globalized integrated circuit manufacturing, protecting against counterfeiting and malicious modifications.

Researchers at Abu Dhabi’s TII Build National Crypto Library for the UAE

TII ·

Abu Dhabi’s Technology Innovation Institute (TII) announced that its Cryptography Research Center (CRC) has developed the UAE’s first national crypto library. The library is designed to protect sensitive data using custom symmetric and asymmetric cryptographic primitives. It will be integrated into the UAE’s critical digital infrastructure across sectors like finance, healthcare, and telecommunications. Why it matters: This establishes sovereign capability in cryptography and enhances security levels against increasingly sophisticated cyberattacks in the UAE.