CIS5371 Cryptography Project topics – SELECTED TOPICS Some topics from Crypto 2013 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. Functional Encryption: New Perspectives and Lower Bounds Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge Bounds in Shallows and in Miseries Limits of provable security for homomorphic encryption Key Homomorphic PRFs and Their Applications Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World Secure Computation Against Adaptive Auxiliary Information Obfuscating Conjunctions Sieve-in-the-Middle: Improved MITM Attacks An Algebraic Framework for Diffie-Hellman Assumptions Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based How to Run Turing Machines on Encrypted Data: Nidhi Shekar ns13j Suchitra Jambawalikar srj13e (Tuesday 4/15) What Information is Leaked under Concurrent Composition? Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose Limits on the Power of Cryptogaphic Cheap Talk Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions On the Security of the TLS Protocol: A Systematic Analysis Linearly Homomorphic Structure-Preserving Signatures and Their Applications Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRF The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries Everlasting Multi-Party Computation Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking Other topics 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. A topic chosen from the textbook A topic of your own ---must be approved Biometric Crypto: please email me details! (Tueday 4/15) Cloud computing Computer Forensics: Brian Finelli, Alekhya Gade (Thursday 4/10) Cryptographic Attacks Database Security: P.Jagadeesh - jp13ab Ritesh Puri - rp13t (Tuesday 4/22) Digital Forensics DOS (& DDOS) Attacks: please email me details! (Tuesday 4/8) Elliptic Curve Cryptography: Anisha Kamble (ak12t) Sinduri Shayamala (ss13w) (Thursday 4/3*) 11. ID based Crypto: Shiva Krishna Imminni (si13f) Pradeep Reddy Konreddy (pk13h) Susheel Kumar Pogaku (sp13ab) (Thursday 4/3*) 12. 13. 14. 15. 16. 17. Internet Security Intrusion Detection Systems: Akshara Dendi ad13r@my.fsu.edu, Lehari Saggam ls13d@my.fsu.edu (Tuesday 4/15) Linux Security Merkle Trees Public Key Infrastructure PGP 19. 20. 21. 22. 23. 24. 25. 26. 27. Public Key Crypto for WSN Secure Software engineering: Omar Azhar Michael (Seth) Kerr (Thursday 4/17) Sensor Networks SSL: David Lafontant (dl10f@my.fsu.edu) Manik Saini (ms13ad@my.fsu.edu) (Thursday 4/3*) Steganography: Anshul Varma(av13v) & Faisal Qureshi(fq13b) (Thursday 4/3*) Trust Computing Trust Management Visual Cryptography: Insoo Lee, Sangmun Kim, and Wondong Lee. (Tuesday 4/15) Malware Analysis: Krishna Sainath Meda (km13w), Priyatham Kadali (pk13), Poornachandra Veladi ( pv13b ) 18. Public Key Infrastructure—Risk Analysis, Achyuth Reddy Jangannagari(aj13h), Kranthi Kumar Chittipolu (kc13x), Shalini Tangella(st13h) LAST DAY FOR HANDING IN PROJECT REPORTS: Thursday 4/17 Peer grading 1. Email your grades to the TA 2. You must attend a presentation to grade it. 3. Each presentation is graded 1-10. 4. The final grade will take into account the written report as well.