Cryptographic Engineering

Cryptographic engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments.

Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), computer engineering(hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design,). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate.

Below are the main topics that are specifically related to cryptographic engineering:

Cryptographic implementations

  • Hardware architectures for public-key and secret-key cryptographic algorithms
  • Cryptographic processors and co-processors
  • Hardware accelerators for security protocols (security processors, network processors, etc.)
  • True and pseudorandom number generators
  • Physically unclonable functions (PUFs)
  • Efficient software implementations of cryptography for embedded processors

Attacks against implementations and countermeasures against these attacks

  • Side channel attacks and countermeasures
  • Fault attacks and countermeasures
  • Hardware tamper resistance
  • Hardware trojans

Tools and methodologies

  • Computer aided cryptographic engineering
  • Verification methods and tools for secure design
  • Metrics for the security of embedded systems
  • Secure programming techniques

Applications

  • Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.)
  • Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)
  • FPGA design security
  • Hardware IP protection and anti-counterfeiting
  • Reconfigurable hardware for cryptography
  • Smart card processors, systems and applications
  • Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)
  • Secure storage devices (memories, disks, etc.)
  • Technologies and hardware for content protection
  • Trusted computing platforms

Interactions between cryptographic theory and implementation issues

  • New and emerging cryptographic algorithms and protocols targeting embedded devices
  • Non-classical cryptographic technologies
  • Special-purpose hardware for cryptanalysis
  • Formal methods for secure hardware

Read more about Cryptographic Engineering:  Major Issues

Famous quotes containing the word engineering:

    Mining today is an affair of mathematics, of finance, of the latest in engineering skill. Cautious men behind polished desks in San Francisco figure out in advance the amount of metal to a cubic yard, the number of yards washed a day, the cost of each operation. They have no need of grubstakes.
    Merle Colby, U.S. public relief program (1935-1943)