Are you passionate about security and cryptography? Curious about implementation attacks and hardware? Join the Digital Security group (DiS) as a PhD Candidate! Symmetric-key algorithms play a fundamental role in modern cryptography, offering tools for data encryption and authentication. These algorithms are often implemented in hardware to meet performance and efficiency requirements, but their deployment can expose them to attacks such as side-channel analysis and fault injection. Countermeasures against these attacks typically come at a cost, such as increased chip area or execution time. Therefore, ensuring resistance against physical attacks while maintaining efficiency is a challenge, especially in resource-constrained devices.
Among symmetric-key algorithms, low-latency ciphers are specifically designed to minimise the delay in processing data, making them particularly suitable for applications like memory encryption or pointer authentication. For such ciphers it is essential to design countermeasures that introduce minimal time overhead.
The goal of this project is to investigate countermeasures for symmetric-key ciphers with limited impact on performance. This includes investigating the physical security of their hardware implementations by analysing their susceptibility to side-channel attacks and/or fault injection attacks. The challenge lies in finding a trade-off between security and performance, ensuring that the proposed countermeasures have minimal impact on the overall efficiency of the hardware.
As part of this project, you can work on different tasks, including developing and testing hardware implementations of symmetric-key algorithms, both with and without countermeasures. You will perform side-channel analysis and/or fault injection experiments on these implementations and contribute to designing novel, low-overhead countermeasures. Special attention will be given to low-latency ciphers, in which efficiency is particularly critical. Additionally, you will evaluate the trade-offs between security, performance, and resource usage, providing insights into how these ciphers can be securely deployed in practical settings.
You will be supervised by
Dr Silvia Mella and
Prof. Lejla Batina to conduct research and publish the results at top-ranked international academic conferences and journals. You will be expected to collaborate with fellow PhD candidates and researchers from Radboud University and from other institutions involved in the project. You will spend about 10% of your time (0.1 FTE) assisting with teaching at our department. This will typically include tutoring practical assignments, grading coursework, and supervising student projects.
Would you like to learn more about what it’s like to pursue a PhD at Radboud University? Visit the page about working as a PhD candidate.