Opendata, web and dolomites

POMEGRANATE

Practice-Oriented Security Models and Granular Designs for Future-Proof Authenticated Encryption

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 POMEGRANATE project word cloud

Explore the words cloud of the POMEGRANATE project. It provides you a very rough idea of what is the project "POMEGRANATE" about.

ict    encryption    reveals    cloud    ae    confidentiality    constructions    secure    communication    proactively    nevertheless    guided    boosting    centric    critically    generation    integrity    modular    adoption    simultaneously    vulnerabilities    envisioned    internet    supposedly    insecure    streaming    ssh    media    run    theory    pomegranate    inconsistencies    review    flexibly    caesar    ranking    cryptographic    practical    evaluation    protocols    widening    heterogeneous    carefully    spectrum    paradigms    ubiquitous    either    bridge    disparate    community    designs    financial    immense    reported    wi    computing    designing    proof    iptv    tools    environments    schemes    capture    faced    ipsec    rethink    algorithms    infrastructure    arisen    services    robustness    fi    fundamentals    grained    appropriate    finalists    infrastructures    governmental    22    fine    industrial    tls    motivated    802    authenticated    popularity    ongoing    misusing    things    data    decade    last    ansi    look    competition    c12    notions    ieee    security    models    11    submissions    gaps    remaining    critical    moving    exploits   

Project "POMEGRANATE" data sheet

The following table provides information about the project.

Coordinator
KATHOLIEKE UNIVERSITEIT LEUVEN 

Organization address
address: OUDE MARKT 13
city: LEUVEN
postcode: 3000
website: www.kuleuven.be

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Belgium [BE]
 Project website https://www.kuleuven.be/english/research/EU/p/horizon2020/es/msca/if-projects/pomegranate
 Total cost 172˙800 €
 EC max contribution 172˙800 € (100%)
 Programme 1. H2020-EU.1.3.2. (Nurturing excellence by means of cross-border and cross-sector mobility)
 Code Call H2020-MSCA-IF-2015
 Funding Scheme MSCA-IF-EF-ST
 Starting year 2017
 Duration (year-month-day) from 2017-09-01   to  2020-08-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KATHOLIEKE UNIVERSITEIT LEUVEN BE (LEUVEN) coordinator 172˙800.00

Map

Leaflet | Map data © OpenStreetMap contributors, CC-BY-SA, Imagery © Mapbox

 Project objective

Authenticated-Encryption (AE) algorithms have recently faced an immense increase in popularity as appropriate cryptographic tools for providing data confidentiality and integrity services simultaneously. AE algorithms are ubiquitous in protocols to secure the very fundamentals of the information and communication infrastructure, being adopted into widely-deployed protocols, such as TLS, SSH, IPsec, IEEE 802.11 (Wi-Fi) and ANSI C12.22. A wide range of recently reported security vulnerabilities and exploits, arisen from either using insecure designs to achieve the AE goal or misusing supposedly secure AE schemes, has motivated the cryptographic community to run the CAESAR competition for designing new AE algorithms, boosting research on AE. Yet a critical look at the classical security models for AE, defined over the last decade, that guided the constructions of CAESAR submissions, and a review of practical applications for AE algorithms reveals several inconsistencies and remaining problems that must be carefully investigated before moving towards adoption of next-generation AE schemes for widespread use in governmental, industrial and financial ICT systems.

POMEGRANATE aims to critically rethink the existing security notions and robustness features for AE schemes and to develop fine-grained security models and modular, future-proof design paradigms that can flexibly capture a widening spectrum of disparate requirements in the emerging streaming media applications such as IPTV as well as in future heterogeneous environments such as Internet of Things and Cloud Computing infrastructures. We aim to proactively identify important ongoing challenges and to bridge the gaps between the theory and practice of AE, looking far beyond the design-centric CAESAR competition. Nevertheless, the results will also impact the evaluation and ranking of the CAESAR finalists, as those schemes should offer a set of envisioned new security and robustness needs for future applications.

 Publications

year authors and title journal last update
List of publications.
2018 Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
published pages: , ISSN: , DOI:
Cryptology ePrint Archive Report 2018/916 2019-07-26

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "POMEGRANATE" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "POMEGRANATE" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.3.2.)

IRF4 Degradation (2019)

Using a novel protein degradation approach to uncover IRF4-regulated genes in plasma cells

Read More  

TheaTheor (2018)

Theorizing the Production of 'Comedia Nueva': The Process of Play Configuration in Spanish Golden Age Theater

Read More  

RealFlex (2019)

Real-time simulator-driver design and manufacturing based on flexible systems

Read More