Key research themes
1. How are stream ciphers designed for hardware-constrained environments such as RFID and IoT devices?
This research area addresses the challenge of designing stream ciphers that achieve secure and efficient encryption in environments with severely limited resources like gate count, power consumption, and memory. Given the proliferation of IoT and RFID devices with stringent hardware constraints, there is substantial activity focusing on lightweight stream ciphers optimized at the hardware level to balance security and implementation cost.
2. How can domain-specific modeling languages and chaos-based methods improve the design and security evaluation of stream ciphers?
This theme explores novel methodological approaches to easing the design, implementation, and assessment of stream ciphers by leveraging graphical domain-specific modeling languages (DSMLs) and chaotic systems for key stream generation. These approaches aim to reduce errors, enhance expressiveness, and introduce strong statistical properties and unpredictability into cipher designs. The research underscores the intersection of software engineering methods with cryptographic security analysis.
3. What are the design strategies and performance trade-offs for fast and secure stream ciphers in software implementations?
This area involves designing stream ciphers that excel in software environments requiring both speed and security, employing novel algorithmic structures, combinations of existing ciphers, or optimized primitives. The research includes performance evaluations against standard statistical tests and comparisons with existing ciphers to ensure practical usability in general-purpose computing and real-time communication systems.