Entrance hall of the ICMS Workshop

Security of symmetric ciphers in network protocols

May 25, 2015 - May 29, 2015

ICMS, 15 South College Street, Edinburgh

Organisers

Name Institution
Maitra, Subhamoy Indian Statistical Institute, Kolkata
Paterson, Kenny Royal Holloway, University of London

 

As part of a collaborative venture between the Indian Statistical Institute, India, and Royal Holloway, University of London, United Kingdom, this workshop will focus on mathematics and its application to cryptology and information security.  The workshop will bring together mathematicians and scientists to cover the broad area of security analysis of network protocols. The ultimate objective of this venture is to have a significant long-term impact in the relevant fields of research in both India and the UK.

This workshop is part of the EPSRC-DST Indo-UK Initiative in Applied Mathematics

Workshop Photograph

Photo of workshop participants 26 May 2015

 Security of symmetric ciphers group photo 

A selection of group photos and some taken at the public lecutres can be found on the ICMS Flickr account.

Arrangements

The workshop will begin with Registration 09.00-09.40 on Monday 25 May and close with lunch on Friday 29 May 2015. 

 

Participation
Invitees have now been contacted and have registered.  Attendance at this workshop is now closed.

 

Registration Fee
A registration fee of 70.00 GBP is payable by all UK-based Invited Participants.  Public Applicants are asked to pay 150.00 GBP.   

  • Payment can be made on arrival at ICMS - at Registration we will accept cash, credit/debit card payments and sterling cheques (payable to “Heriot-Watt University”).  Unfortunately, we do not yet have an on-line payment system at ICMS.   If you wish to pay by credit/debit card, please complete the form (available in the link below) and bring the completed form to Registration.  
  • Alternatively, if you wish to pay in advance, please print out the credit/debit card payment form and complete by filling in your details.  As email is not secure, the completed form should be faxed to me using the fax number at the top of the form.   The fax machine is in a locked room and your details will be kept securely until payment is taken.  We also accept sterling cheques, made payable to “Heriot-Watt University” but sent to Audrey Brown, ICMS, 15 South College Street, Edinburgh, EH8 9AA.  A receipt will be emailed to you.

 

Venue and Talks
The workshop will be held at ICMS, 15 South College Street, Edinburgh.  You may find this map useful for the workshop.  All lectures will be held in the Newhaven Lecture Theatre.    The Lecture Theatre is equipped with a data projector, computer, visualiser (the new generation of overhead projectors) and two blackboards.  The projector and one board may be used simultaneously.  It is best to bring your presentation on a memory stick to use in our ICMS computer.   Alternatively, it is possible for you to use your own laptop with our dataprojector, but please be aware that you may have to alter your laptop resolutions/settings. 

 

UK Visas
If you are travelling from overseas you may require an entry visa. A European visa does not guarantee entry to the UK. Please use this link to the UK Visas site to find out if you need a visa and if so how to apply for one.

 

Travel
Information about travel to the UK and Edinburgh is available here.  Please note that it is your responsibility to have adequate travel insurance to cover medical and other emergencies that may occur on your trip.   Additional information for Indian delegates regarding onward travel in the UK, from Heathrow and Birmingham airports is available here.

A taxi directly from the airport will cost approximately 20.00 GBP to the city centre for a one-way journey.     There is also a bus service direct from the airport to the city centre which will cost 4.50 GBP single or 7.50 GBP return - the Airlink 100.  This is a frequent service (every 10 minutes during peak times) and will bring you close to Waverley Railway Station and the workshop venue.  There is now also a tram which links the Airport to Edinburgh city centre. 

Lothian buses charge 1.50 GBP for a single, 4.00 GBP for a day ticket. Please note that the exact fare is required and no change is given.

If travelling by train, please note that Edinburgh has several railway stations; Waverley Railway Station being the main station and closest to the workshop venue at 15 South College Street. If you alight at Edinburgh Waverley, the meeting venue is an easy 10 minute walk over North and South Bridge.  The other railway stations are Haymarket and Edinburgh Park but please note that these stations are at the West End of the city centre.

 

Accommodation

  • Invited Participants will have accommodation arranged by ICMS (should they wish).  Full details of the accommodation will be emailed nearer the time of the workshop. 
  • Public Applicants must arrange and pay for their own accommodation.  Some suggestions for accommodation can be found here

 

Public Lectures - Tuesday 26 May
Doors will open to the Public at 17.30.

Following the two talks, there will be an informal wine reception in the Chapterhouse, Level 1, at ICMS.  Seats have already been reserved for the workshop participants, therefore, you do not need to book.  

18.00-18.45:  Chris Mitchell (Royal Holloway, University of London)
Challenges in standardising cryptography
Standards have always played a leading role in the development of symmetric cryptography, starting in the 1970s with the competition that led to Data Encryption Standard block cipher.  Since then, many different bodies have developed cryptographic standards, both for general purpose use (e.g. NIST and ISO/IEC) and for specific purposes (e.g. 3GPP for mobile systems and IETF for Internet security).  Today we have a wide range of standards cover a broad spectrum of cryptographic techniques, from block ciphers to privacy enhancing technologies.  In this talk I will briefly review the history of cryptographic standardisation, and then consider some of the serious challenges facing cryptographic standardisation bodies today.  These challenges include deciding whether or not to standardise particular schemes, managing the number of standardised algorithms and protocols, and dealing with compromised and potentially compromised techniques.  Addressing these issues requires the involvement of academic researchers, who can in particular provide up to date assessments of candidate algorithms and current information about possible attacks.  Unfortunately, academics often find it difficult to get the time and resources to be involved, and as a result the standardisation processes, and hence the users of standards, suffer.

18.45-19.30, Bimal Roy (Director, Indian Statistical Institute)
Development of cryptography in India
Cryptology has come a long way, from being of practical interest to only the Governments and armed forces, to an interdisciplinary academic discipline in the modern era of digital communication and e-commerce. The journey of the subject from confidential military documents to open academic literature is more or less the same in India as in the other parts of the world. In this talk, I will present the evolution of cryptography in Indian academia, since 1990, highlighting the major results produced during the last two decades. I will also focus on the dissemination of cryptography education in India during this period, inception of Cryptology Research Society of India inspired by IACR, and the history of the international conference Indocrypt, which connected us to the vibrant global community in cryptology and allied disciplines.

 

Catering
The workshop grants will provide refreshments during the breaks in the Programme, lunch Monday to Friday inclusive, and an informal wine reception on Monday evening (where pizza will be available ) after the talks.  Also included are two dinners; one at Blonde Restaurant, 1 St Leonard's Street, Edinburgh on Tuesday 26 May at 20.30 and another at The Magnum Restaurant on Thursday 26 May at 19.00.  

 

Wireless Access
The workshop venue, 15 South College Street, has wireless access throughout. On arrival at Registration you will be given instructions and a code for accessing the wireless network.  For those without laptops, there will also be a couple of computers available for you to check your emails. 

 

Programme

Please continue to check the Programme until the time of the workshop as any updates will be notified here.


Monday 25 May 2015

09.00-09.40

Registration & coffee in the Chapterhouse, Level 1

09.40-09.45

Kenny Paterson: Opening remarks

09.45-10.30

Guy Barwell (University of Bristol)
Turning online ciphers off

10.30-11.00

Coffee/Tea in the Chapterhouse

11.00-11.45

Sushmita Ruj (Indian Statistical Institute)
Combinatorial key management in resource constrained devices

11.45-12.30

Sam Scott (Royal Holloway, University of London)
Key rotation in symmetric protocols

12.30-14.00

Lunch provided in the Chapterhouse

14.00-14.45

Theodosis Mourouzis (University College London)
Multiplicative complexity reductions in cryptography and cryptanalysis

14.45-15.30

Ana Salagean (Loughborough University)
Combinatorial results for higher order differential attacks

15.30-16.00

Coffee/Tea in the Chapterhouse

16.00-16.45

Rachel Player (Royal Holloway, University of London)
On the concrete hardness of Learning with Errors   pdf of presentation

16.45-17.30

Naomi Farley (Royal Holloway, University of London)
Cryptographic enforcement of information flow policies without public information

17.30-19.00

Informal reception in the Chapterhouse, Level 1 (pizza and drinks will be available)

 

Tuesday 26 May

09.30-10.30

Sourav Sen Gupta (Indian Statistical Institute)
RC4 - non-random sequences from non-random permutations  pdf of presentation

10.30-11.00

Coffee/Tea in the Chapterhouse

11.00-11.45

Thyla Van Der Merwe (Royal Holloway, University of London)
Attacking TLS: Exploiting non-randomness in RC4

11.45-12.30

Matthew Dodd (Cryptocraft Ltd.)
On Kenny's unicity distance problem

12.30

Group photograph will be taken 

12.35-14.00

Lunch provided in the Chapterhouse

14.00-14.45

Mark Ryan (University of Birmingham)
How to detect unauthorised usage of a key

14.45-15.30

Christian Janson (Royal Holloway, University of London)
Verifiable computation schemes: outsourcing computation to untrusted servers
pdf of presentation

15.30-16.00

Coffee/Tea in the Chapterhouse

16.00-16.45

Martin Albrecht (Royal Holloway, University of London)
Ciphers for MPC and FHE

16.45-17.30

Enrique Larraia (Royal Holloway, University of London)
Efficient multi-party computation from oblivious transfer

   

17.30

Doors open to the public

18.00-18.45

Public Lecture by Chris Mitchell (Royal Holloway, University of London)
Challenges in standardising cryptography   pdf of presentation

18.45-19.30

Public Lecture by Bimal Roy (Indian Statistical Institute)
Development of cryptography in India

19.30-20.15

Drinks Reception

20.30

Informal evening meal at Blonde Restaurant, 75 St Leonard's Street, Edinburgh

 

Wednesday 27 May

09.30-10.30

Markulf Kohlweiss (Microsoft Research)
The (mi)TLS record protocol: can cryptography, formal methods, and applied security be friends?

10.30-11.00

Coffee/Tea in the Chapterhouse

11.00-11.45

Kenny Paterson (Royal Holloway, University of London)
Stream-based secure channels  pdf of presentation

11.45-12.30

Mark Manulis (University of Surrey)
On cryptography, passwords, and TLS

12.30-14.00

Lunch provided in the Chapterhouse

 

Free afternoon exploring Edinburgh

 

Thursday 28 May

09.30-10.30

Steve Babbage (Vodafone)
Symmetric ciphers in mobile phone networks

10.30-11.00

Coffee/Tea in the Chapterhouse

11.00-11.45

Bhupendra Singh (CAIR, DRDO)
On bent function affine in-equivalence a decisional approaches

11.45-12.30

Luke Mather (University of Bristol)
Side-channel analysis in a networked environment

12.30-14.00

Lunch provided in the Chapterhouse

14.00-14.45

Nicolas Courtois (University College London)
Survey of recent attacks on GOST block cipher

14.45-15.30

Goutam Paul (Indian Statistical Institute)
Non-randomness of reduced-round Salsa20 and its implications   pdf of presentation

15.30-16.00

Coffee/Tea in the Chapterhouse

16.00-16.45

Pooya Farshim (Queen's University Belfast)
RKA security analysis of blockciphers

16.45-17.45

Christophe Petit (University College London)
Rubik's for cryptographers: symmetric key cryptography from public key mathematics

19.00

Workshop Dinner at The Magnum Restaurant, 1 Albany Street, Edinburgh

 

Friday 29 May

09.30-10.30

Michael Ward and David Roberts (MasterCard)
Symmetric ciphers and international retail payments

10.30-11.00

Coffee/Tea in the Chapterhouse

11.00-11.45

James Alderman (Royal Holloway, University of London)
Extensions to publicly verifiable outsourced computation

11.45-12.30

Martijn Stam (University of Bristol)
The role of key wrapping in cryptographic APIs

12.30-12.35

Closing remarks

12.35-13.30

Lunch provided in the Chapterhouse.  Workshop closes.

 

Presentations:

Presentation Details
Albrecht, Martin
Ciphers for MPC and FHE
View Abstract Down
Alderman, James
Extensions to publicly verifiable outsourced computation
Babbage, Steve
Symmetric ciphers in mobile phone networks
View Abstract Down
Barwell, Guy
Turning online ciphers off
View Abstract Down
Courtois, Nicolas
Survey of recent qttacks on GOST block cipher
View Abstract Down
Dodd, Matthew
On Kenny's unicity distance problem
View Abstract Down
Farshim, Pooya
RKA security analysis of blockciphers
View Abstract Down
Janson, Christian
Verifiable computation schemes: outsourcing computation to untrusted servers
View Abstract Down
Kohlweiss, Markulf
The (mi)TLS record protocol: can cryptography, formal methods, and applied security be friends?
View Abstract Down
Kumar Dalai, Deepak
On algebraic structures of incidence matrix to compute algebraic immunity of Boolean functions
View Abstract Down
Larraia, Enrique
Efficient multi-party computation from oblivious transfer
View Abstract Down
Manulis, Mark
On cryptography, passwords, and TLS
View Abstract Down
Mather, Luke
Side-channel analysis in a networked environment
View Abstract Down
Mitchell, Chris
Public Lecture: Challenges in standardising cryptography
View Abstract Down
Mourouzis, Theodosis
Multiplicative complexity reductions in cryptography and cryptanalysis
View Abstract Down
Paterson, Kenny
Stream-based secure channels
View Abstract Down
Paul, Goutam
Non-randomness of reduced-round Salsa20 and its implications
View Abstract Down
Petit, Christophe
Rubik's for cryptographers: symmetric key cryptography from public key mathematics
View Abstract Down
Roberts, David
Symmetric ciphers and international retail payments (jointly with Mike Ward)
View Abstract Down
Roy, Bimal
Public Lecture: Development of cryptography in India
View Abstract Down
Ruj, Sushmita
Combinatorial key management in resource constrained devices
View Abstract Down
Ryan, Mark
How to detect unauthorised usage of a key
View Abstract Down
Salagean, Ana
Combinatorial results for higher order differential attacks
View Abstract Down
Scott, Sam
Key rotation in symmetric protocols
View Abstract Down
Sen Gupta, Sourav
RC4 - non-random sequences from non-random permutations
View Abstract Down
Singh, Bhupendra
On Bent function affine in-equivalence a decisional approaches
View Abstract Down
Stam, Martijn
The role of key wrapping in cryptographic APIs
View Abstract Down
Van Der Merwe, Thyla
Attacking TLS: Exploiting non-randomness in RC4
View Abstract Down
Ward, Michael
Symmetric ciphers and international retail payments (joint presentation with David Roberts)
View Abstract Down

Participants

Name Institution
Albrecht, Martin Royal Holloway, University of London
Alderman, James Royal Holloway, University of London
Babbage, Steve Vodafone
Barwell, Guy University of Bristol
Berners-Lee, Elizabeth Royal Holloway, University of London
Bootle, Jonathan University College London
Bricout, Rémi Royal Holloway, University of London
Cerulli, Andrea University College London
Courtois, Nicolas University College London
Davidson, Alex Royal Holloway, University of London
Davies, Gareth University of Bristol
Degabriele, Jean Paul Royal Holloway, University of London
Dodd, Matthew Cryptocraft Ltd.
Farley, Naomi Royal Holloway, University of London
Farshim, Pooya Queen's University Belfast
Gardner, Dave Loughborough University
Hutchinson, Daniel Royal Holloway, University of London
Janson, Christian Royal Holloway, University of London
Kohlweiss, Markulf Microsoft Research
Laing, Thalia Royal Holloway, University of London
Larraia, Enrique Royal Holloway, University of London
Manulis, Mark University of Surrey
Mather, Luke University of Bristol
Meiklejohn, Sarah University College London
Mitchell, Chris Royal Holloway, University of London
Mourouzis, Theodosis University College London
Paterson, Kenny Royal Holloway, University of London
Paul, Goutam Indian Statistical Institute
Petit, Christophe University College London
Player, Rachel Royal Holloway, University of London
Renwick, Sarah-Louise Royal Holloway, University of London
Roberts, David MasterCard
Roy, Bimal Indian Statistical Institute
Ruj, Sushmita Indian Statistical Institute
Ryan, Mark University of Birmingham
Salagean, Ana Loughborough University
Scott, Sam Royal Holloway, University of London
Sen Gupta, Sourav Indian Statistical Institute
Singh, Bhupendra CAIR, DRDO
Sobrinho, Lex PGDS Risk and Security
Stam, Martijn University of Bristol
Thomson, Susan University of Bristol
Van Der Merwe, Thyla Royal Holloway, University of London
Ward, Michael MasterCard
Wei, Yongzhuang Guilin University of Electronic Technology
Woodage, Joanne Royal Holloway, University of London