Below is a list of open topics in our group. If you are interested in one of these, please contact directly the contact person indicated at the bottom. We don't have any other open topics at the moment. However, if you have an interesting idea for a master or bachelor thesis in the field of QPC, feel free to suggest this topic to us.
Title: Analyzing attacks against code-based signatures (Master thesis)
Description: Three signature schemes based on codes were submitted to the NIST PQC standardization process. During the first round, all of these submissions have been broken. The goal of this thesis is identify design mistakes made in the development of these signature schemes by analyzing the attacks and looking for similarities and differences.
Contact: Juliane Kr?mer (jointly supervised with Patrick Struck)
Title: Studying several algorithms for optimizing code-based cryptography (Master thesis, in cooperation with the Thales Group)
Description: Classic-McEliece is one of the oldest crypto schemes for asymmetric key exchange. From a security perspective, it is also one of the best algorithms, since there was no substantial decrease in its security level (as compared to other schemes, e.g., from lattice-based or multivariate cryptography). Besides these advantages, there are three disadvantages that are often reasons for avoiding the algorithm in practical use cases: 1) the public key size, 2) the time for computing the public key and 3) the need to store a big matrix on a processor until the computation of the public key is done. The main bottleneck for the last two disadvantages is the Gauss-Jordan algorithm for matrix inversion, which is mostly done in a na?ve manner. In this work, the main goal is to investigate the use of other algorithms as an alternative to the na?ve Gauss-Jordan, like Wiedemann’s algorithm, Strassen’s Algorithm or the Four Russian’s algorithm (or a combination). The algorithms should be investigated in regard for a sequential inversion (no need to hold the full matrix in a processor) with a low hardware footprint and in regard for parallelization with a larger hardware footprint but also for faster computation. After the investigation, the algorithm (or a combination of the mentioned algorithms) should be implemented on an FPGA.
Contact: Juliane Kr?mer
Leon Weingarten,
Master,
Isogeny-Based Cryptography: From SIDH’s Fall to New Horizons,
joint with Prof. Dr. Müller
Andreas Hellenbrand,
Master,
Performance Evaluation of CSIDH on the Surface,
joint with Prof. Dr. Reith
Michael Schaller,
Master,
Codes from Fibered Surfaces,
joint with Prof. Dr. Bruinier
Erik Kubaczka,
Master,
Analysis of Attacks on Multivariate PKE and KEM in the NIST Process
Yulia Kuzovkova,
Master,
Side-Channel Analysis of Post-Quantum Secure Lattice-Based Cryptographic Schemes
Yonca Bakanay,
Master,
Security proofs in the quantum random oracle model
Georg Wurst,
Bachelor,
Number Theoretic Codes and their application in cryptography (in German),
joint with Prof. Dr. Bruinier
Azar Parishan,
Bachelor,
On the Security Notions for Encryption Schemes
Sebastian Schuberth,
Master,
Fault Attacks on Multivariate Signature Schemes