Zu Hauptinhalt springen

Abschlussarbeiten

Nachstehend finden Sie eine Liste der offenen Themen in unserer Gruppe. Wenn Sie an einem dieser Themen interessiert sind, wenden Sie sich bitte direkt an die angegebene Kontaktperson. Wir haben aktuell keine anderen offenen Themen. Wenn Sie jedoch eine interessante Idee für eine Master- oder Bachelorarbeit im Bereich QPC haben, können Sie dieses Thema gerne einem oder allen von uns vorschlagen.


Offene Themen

  • Title: Security Analysis of MAYO (Master thesis)
    Description: MAYO is a recently published signature scheme based on multivariate quadratic equations. Its performance and key sizes are compatible to lattice-based signature schemes, including NIST's finalists Dilithium and Falcon. An appealing task for such a young scheme is to investigate it regarding possible improvements in cryptanalysis. Like Rainbow and LUOV, MAYO is a modification of UOV. The past has shown that such modifications can lead to additional attack vectors, that might be exploited. Thus, a detailed security analysis is an important step in the development process of MAYO.
    Contact: Thomas Aulbach

  • Title: Analyzing attacks against code-based signatures (Master thesis)
    Description: Three signature schemes based on codes were submitted to the NIST PQC standardization process. During the first round, all of these submissions have been broken. The goal of this thesis is identify design mistakes made in the development of these signature schemes by analyzing the attacks and looking for similarities and differences.
    Contact: Juliane Krämer (jointly supervised with Patrick Struck)

  • Title: Studying several algorithms for optimizing code-based cryptography (Master thesis, in cooperation with the Thales Group)
    Description: Classic-McEliece is one of the oldest crypto schemes for asymmetric key exchange. From a security perspective, it is also one of the best algorithms, since there was no substantial decrease in its security level (as compared to other schemes, e.g., from lattice-based or multivariate cryptography). Besides these advantages, there are three disadvantages that are often reasons for avoiding the algorithm in practical use cases: 1) the public key size, 2) the time for computing the public key and 3) the need to store a big matrix on a processor until the computation of the public key is done. The main bottleneck for the last two disadvantages is the Gauss-Jordan algorithm for matrix inversion, which is mostly done in a naïve manner. In this work, the main goal is to investigate the use of other algorithms as an alternative to the naïve Gauss-Jordan, like Wiedemann’s algorithm, Strassen’s Algorithm or the Four Russian’s algorithm (or a combination). The algorithms should be investigated in regard for a sequential inversion (no need to hold the full matrix in a processor) with a low hardware footprint and in regard for parallelization with a larger hardware footprint but also for faster computation. After the investigation, the algorithm (or a combination of the mentioned algorithms) should be implemented on an FPGA.
    Contact: Juliane Krämer


Laufende Arbeiten

  • Laura Bismark
    Master
    PQC for automotive security
  • Paul-Philipp Schwarck
    Bachelor
    Security of classic McEliece PKE in Comparison with Niederreiter's PKE
    joint with Prof. Künnemann


Abgeschlossene Arbeiten

  • Tim Schumacher
    Master,
    Post-Quantum Authentication for Quantum Key Distribution,
    Joint with Maximilian Tippman, Universität Darmstadt

  • Leon Weingarten,
    Master,
    Isogeny-Based Cryptography: From SIDH’s Fall to New Horizons,
    joint with Prof. Dr. Müller

  • Andreas Hellenbrand,
    Master,
    Performance Evaluation of CSIDH on the Surface,
    joint with Prof. Dr. Reith

  • Michael Schaller,
    Master,
    Codes from Fibered Surfaces,
    joint with Prof. Dr. Bruinier

  • Erik Kubaczka,
    Master,
    Analysis of Attacks on Multivariate PKE and KEM in the NIST Process

  • Yulia Kuzovkova,
    Master,
    Side-Channel Analysis of Post-Quantum Secure Lattice-Based Cryptographic Schemes

  • Yonca Bakanay,
    Master,
    Security proofs in the quantum random oracle model

  • Georg Wurst,
    Bachelor,
    Number Theoretic Codes and their application in cryptography (in German),
    joint with Prof. Dr. Bruinier

  • Azar Parishan,
    Bachelor,
    On the Security Notions for Encryption Schemes

  • Sebastian Schuberth,
    Master,
    Fault Attacks on Multivariate Signature Schemes


  1. Fakultät für Informatik und Data Science

Lehrstuhl für Datensicherheit und Kryptographie

Gruppenbild November 2024

Datensicherheit und Kryptographie

Quantum and Physical Attack Resistant Cryptography

Bajuwarenstraße 4
93053 Regensburg