Add to favorites:
Share:
Projects’ results are expected to contribute to some or all of the following outcomes:
- Design and implementations of Post-Quantum Cryptography (PQC) algorithms that are resistant to side-channel and fault attacks;
- Optimized countermeasures taking into account a balanced trade-off between security, performance, and costs;
- Recommendations on implementing countermeasures for a broad range of attacks, also identifying the available and necessary hardware;
- Analysis of new attacks or combinations of attacks, also eventually enhanced by AI, applicable to real-world conditions.
- Design of automated security evaluations for PQC implementations.
The security of the implementations of PQC algorithms is vital for maintaining the confidentiality, integrity, authenticity and availability of digital information and communications in the face of implementation attacks, such as, for example, side-channel attacks using information from timing, power consumption, electromagnetic radiation, fault attacks disturbing the secure of operation of the device and their combination. Such attacks, eventually also enhanced by the use of deep learning, constitute significant threats to both (embedded and regular) software and hardware implementations. In various application areas such as IoT, cloud-based applications, automotive, measures to prevent such attacks currently lead to substantial resource overhead due to the complexity of the algorithms, and the security remains unclear given the limited exploration of different attack surfaces. Countermeasures, to the extent that they are available, may have significant impact on run-time and memory consumption. Resistance in PQC implementations to implementation attacks is an increasingly common concern among customers, especially when exploring the right balance between security and performance.
Evaluating the security of PQC algorithm implementations against side-channel and fault attacks is crucial, given the proven vulnerabilities. Various countermeasures, such as masking, shuffling, randomized clocking, random delay insertion, constant weight encoding, code polymorphism, control-flow integrity and re-computation of critical operations can be employed to mitigate these attacks. Synergies between specific countermeasures and the design of cryptographic systems are available for pre-quantum cryptography but require investigation for post-quantum cryptography.
Proposals are welcome on developing solutions that protect against such implementation attacks, at reasonable costs and minimizing the loss of performance while maintaining the required security, as well as on the analysis of new attacks or combinations of attacks, also powered by the use of AI, for security-by-design approaches when designing Post Quantum Cryptographic systems. Activities can also lead to the development of testing methodologies and frameworks for automated security evaluations for correctness and resistance to remote side-channel attacks for regular software and for correctness and resistance to a broad range of implementation attacks for embedded software and hardware.
Expected Outcome
Projects’ results are expected to contribute to some or all of the following outcomes:
- Design and implementations of Post-Quantum Cryptography (PQC) algorithms that are resistant to side-channel and fault attacks;
- Optimized countermeasures taking into account a balanced trade-off between security, performance, and costs;
- Recommendations on implementing countermeasures for a broad range of attacks, also identifying the available and necessary hardware;
- Analysis of new attacks or combinations of attacks, also eventually enhanced by AI, applicable to real-world conditions.
- Design of automated security evaluations for PQC implementations.
Scope
The security of the implementations of PQC algorithms is vital for maintaining the confidentiality, integrity, authenticity and availability of digital information and communications in the face of implementation attacks, such as, for example, side-channel attacks using information from timing, power consumption, electromagnetic radiation, fault attacks disturbing the secure of operation of the device and their combination. Such attacks, eventually also enhanced by the use of deep learning, constitute significant threats to both (embedded and regular) software and hardware implementations. In various application areas such as IoT, cloud-based applications, automotive, measures to prevent such attacks currently lead to substantial resource overhead due to the complexity of the algorithms, and the security remains unclear given the limited exploration of different attack surfaces. Countermeasures, to the extent that they are available, may have significant impact on run-time and memory consumption. Resistance in PQC implementations to implementation attacks is an increasingly common concern among customers, especially when exploring the right balance between security and performance.
Evaluating the security of PQC algorithm implementations against side-channel and fault attacks is crucial, given the proven vulnerabilities. Various countermeasures, such as masking, shuffling, randomized clocking, random delay insertion, constant weight encoding, code polymorphism, control-flow integrity and re-computation of critical operations can be employed to mitigate these attacks. Synergies between specific countermeasures and the design of cryptographic systems are available for pre-quantum cryptography but require investigation for post-quantum cryptography.
Proposals are welcome on developing solutions that protect against such implementation attacks, at reasonable costs and minimizing the loss of performance while maintaining the required security, as well as on the analysis of new attacks or combinations of attacks, also powered by the use of AI, for security-by-design approaches when designing Post Quantum Cryptographic systems. Activities can also lead to the development of testing methodologies and frameworks for automated security evaluations for correctness and resistance to remote side-channel attacks for regular software and for correctness and resistance to a broad range of implementation attacks for embedded software and hardware.
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our premium members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Premium now and never miss an important opportunity again! Already a premium member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our premium members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Premium now and explore your personalized technology matches today! Already a premium member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Premium: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a Premium member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our Premium knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Premium now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.