CryptoBG*2018

CryptoBG*2018

International Summer School in Cryptology and Cyber-Resilience

8 – 15 July 2018 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria
(view more about the location)

Registration is open until June 20th! >>> to download the registration form, click here.
CryptoBG*2018 First announcement >>> download from here
CryptoBG*2018 Sponsorship package >>> download from here
Queries and interest >>> info (at) cryptoBG (dot) org


One intensive week of theory, practice and discussions: 4-hour lectures and tutorials by international experts extended with practical workshops, labs and seminars, simulations, round-table discussions and working groups on hot topics


Topics of the year:

  • Symmetric Encryption
  • White-Box Cryptogaphy
  • Blockchain
  • Secure Multi-Party Computation
  • Deep Learning
  • Biometrics

And a round of CTF*BG (Capture The Flag) by the CyResLab of ESI CEE – RED <>BLUE teams in 3 sessions:

  • CTF “warm up” & challenges explained
  • Active security
  • CTF*BG Ultimate

Especially for the Industry and Sponsors: Challenge the CryptoBG*2018 team – define a problem/challenge, bring it on day 1 and get a solution in a week
Lectures and Tutorials
Dr. Claude Barral (Bactech, France) – Evaluation of biometric systems: who said straightforward?

The current rapid growth of biometric authentication features within consumer devices paves the way to security and performance certification needs. For more than a decade, IT security players tried to map certification schemes from smartcards and ICT systems to the area of Biometrics without success. Why?
We will discuss all the issues one may face while setting up an evaluation environment for any biometric systems: which biometric data is targeted? How many different security settings? What is a representative database? Public vs Private databases? Target database size and architecture? How many authentication tests needed to claim a 0,001% false acceptance rate?
Which evaluation target: Compliance? Interoperability? Security? Performances? Well, definitely not straightforward indeed! You will see…
Dr. Christina Boura (Université de Versailles, France) – Block Ciphers and Boolean Functions for Symmetric Cryptography
Block ciphers are probably the most employed and well studied primitives in symmetric-key cryptography. This course will start by analysing the design principles behind these constructions and focus on some of the most important attacks against them, notably the differential, linear and higher-order differential attacks. To avoid these attacks, block cipher designers must carefully choose the inner primitives, especially for the non-linear layer. The second part of this course will focus on vectorial Boolean functions for symmetric key cryptography by discussing the most important properties that such functions should have in order to be used as inner parts of block ciphers.

Dr. Julien Bringer (Smart Valor, Switzerland) – Blockchain
Dr. Nadia El Mrabet (ENSMSE, France) – Introduction to Cryptography
Dr. Nicolas Gama (Inpher, Switzerland) – Privacy Preserving Computation
Dr. Pascal Paillier (CryptoExperts, France) – White-Box Cryptography
Dr. Adrian Thillard (ANSSI, France) –Deep Learning Techniques for Side-Channel Analysis

Implementations of cryptographic algorithms on embedded devices often leak information on the manipulated secret datas. This information can be retrieved through the observation of physical channels, such as the power consumption, time of response, or electro-magnetic emanations of the device. So-called Side-Channel Attacks exploiting this kind of observations are known since the late 1990s.
Deep learning methods are a subclass of machine learning algorithms based on multiple layers of nonlinear processing units for feature extraction and transformation. These methods have been successfully used in the recent years in many fields, such as image recognition, speech recognition, bioinformatics, or even chess and go.
During this tutorial, we will start with a description of the main steps of side-channel attacks, and highlight the distinction between profiled and non-profiled side-channel attacks.
We will then introduce the basics of Multi-Layer Perceptrons and Convolutional Neural Networks, and illustrate how these algorithms can be used to automatically solve some problems encountered by a side-channel evaluator.
Working on a public database of real side-channel acquisitions, we will apply those methods to retrieve the secret key. To do so, we will be using the Keras library on top of Google’s Tensorflow, allowing us to build layer by layer a neural network. We will then train our network and use it to predict the correct manipulated values. We will then study the relevance and impact of hyperparameters on our results, and compare its performance against classical side-channel approaches.

Short talks
Adrián Ranea (KU Leuven, Belgium) – Affine Encodings for White-Box Cryptography
Ilia Dafchev (Telelink, Bulgaria) – Practical Malware Analysis of the Crysis/Dharma Ransomware

A malware sample of a variation of the Crysis/Dharma ransomware was obtained during a real case from an infected host. The malware was analysed using reverse engineering. The approach for the static analysis and the internal logic will be presented. The malware spreading, installation, encryption mechanisms, obfuscation and integrated static analysis prevention techniques will be discussed. The main focus of the presentation and the discussion will be on static analysis and cryptographic algorithms used in the malware.
Organized by:

Supported by: