Project Overview

Project Code: CIT 14

Project name:

Signature Schemes

TUM Department:

CIT - Electrical and Computer Engineering

TUM Chair / Institute:

Institute for Communications Engineering, Professorship for Coding and Cryptography

Research area:

Coding and Cryptography

Student background:

Computer EngineeringComputer Science/ InformaticsMathematics

Further disciplines:

Participation also possible online only:

Planned project location:

Building N4
Technical University of Munich
Theresienstrasse 90
80333 München

Project Supervisor - Contact Details


Title:

Prof. Dr.

Given name:

Violetta

Family name:

Weger

E-mail:

violetta.weger@tum.de

Phone:

+41 79 590 92 70

Additional Project Supervisor - Contact Details


Title:

Given name:

Hugo

Family name:

Sauerbier Couvée

E-mail:

hugo.sauerbier-couvee@tum.de

Phone:

Additional Project Supervisor - Contact Details


Title:

Prof. Dr.-Ing.

Given name:

Antonia

Family name:

Wachter-Zeh

E-mail:

antonia.wachter-zeh@tum.de

Phone:

Project Description


Project description:

*NIST Standardization Process*

In a digital world, the steady advances in quantum technology are threatening the security of our daily life as all currently employed asymmetric cryptosystems would be efficiently broken by a capable quantum computer. In answer to this threat, the National Institute for Standards and Technology (NIST) initiated in 2017 a standardization process for post-quantum cryptography, i.e., cryptosystems that will withstand quantum attacks. The security is generally based on the hardness of solving certain problems from many branches of mathematics.


*Signature Schemes*

Recently, in June 2023, researchers around the world submitted new proposals to NIST for post-quantum signature schemes which is the focus of this project.

A signature scheme allows one party (the sender Alice) to sign her message by appending a short tag (i.e. signature) to it. This signature can then be verified by anyone proving to them that the message was indeed signed by Alice and not by some malicious third-party. In order to be secure, it should be hard for any third-party (even with access to quantum computers!) to generate a valid message-signature pair that a verifier would accept as being signed by Alice. In order to be useful in practice, the signature scheme should be computationally efficient and use small-sized signatures, among other requirements.


*Post-Quantum Cryptography at TUM*

Post-quantum cryptography is a rather new discipline, which is developing rapidly. At the Institute for Coding and Cryptography headed by Prof. Antonia Wachter-Zeh, researchers have contributed for many years to the NIST standardization process and recently submitted two new proposals for post-quantum signature schemes: CROSS and FuLeeca.

What can you do in this project?
- Analyze the security of the newly submitted signature schemes
- Come up with new attacks for the schemes
- Repair schemes that have already been partially broken
- Possibly design new schemes

The exact tasks can be set depending on your interest and previous knowledge. We look forward to welcoming you in Munich!

Working hours per week planned:

30

Prerequisites


Required study level minimum (at time of TUM PREP project start):

2 years of bachelor studies completed

Subject related:

linear algebra
basics of channel coding
interest in cryptography

Other:

  • Keine Stichwörter