Underhanded Crypto Contest

For everyone playing around with Crypto there are certainly moments where the developed and implemented algorithm does just the opposite of what is expected; which leads to the code thrown off in some dark corner of the hard-disk. If this is same case with you, now is the good time to get all those codes that out because there is a new crypto competition!

Underhanded Crypto Contest

The Underhanded Crypto Contest is a competition to write or modify crypto code that appears to be secure, but actually does something evil. For example:

* A password hashing library that always accepts the password “monkey.”

* A MAC algorithm that can be broken if you know some fixed secret key.

* Something that leaks the key through a reliable side channel, padding, IV, etc.

* A user interface that makes it easy to accidentally spread your secrets all over the Internet.


Submission deadline is Dec 2, 2014, in accordance to the rules

Winners will be announced on Dec 30, 2014.

Removing RSA keys by acoustic cryptanalysis



Image from: xkcd

The famous cryptographer Adi Shamir and his colleagues published a scientific paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

Many computers emit high frequency sound during operation, because of the vibrations in some electronic components (capacitors) caused due to microscopic variations in the voltage of the CPU during different workload on it. In theory, these sound vibrations can be analyzed in order to obtain information about the running application software, including cryptographic calculations. In 2004 year, Shamir and his colleagues have shown that different RSA keys cause different sound patterns, but back then it could not be understood how to extract individual bits keys. The main problem was that the sound equipment was unable to record sound with a high sampling frequency: 20 Khz only for conventional microphones and a few hundred kilohertz for ultrasonic microphones. This is many orders of magnitude low than several GHz, which is operated in modern computers.

Now they have demonstrated it with a software that extracts the full 4096-bit keys with GnuPG computers of various models after an hour of listening, if the computer all the time performs decryption. Conducted successful demonstration of such an attack using a smartphone, which lay 30 cm from the computer.


When using the directional microphone can attack from a distance of up to 4 metres.


If miniature hidden microphones are used, the maximum distance is about 1 meter. All equipment on the photos, in addition to microphones, can be hidden under a desk or in another discrete location.

At large scale, it seriously pose a threat and perhaps having organizational severs in fully shielded rooms would prevent it.

Photos from the paper.

Second International Workshop on Lightweight Cryptography for Security & Privacy

via Mailing list


Important Dates

Submission deadline: January  25th, 2013 at 23:59 UTC

Acceptance notification: March 8th, 2013

Workshop presentations: May 6-7, 2013

Background, aim and scope

The main goal of this workshop is to promote and initiate novel research on the security & privacy issues for applications that can be termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. As such applications are becoming ubiquitous, definitely providing an immense value to the society, they are also affecting a greater portion of the public & leading to a plethora of economical & security and privacy related concerns. The goal of this workshop is to create a platform where these concerns can be addressed and proposed solutions are discussed and evaluated. The solutions should be economically applicable in constrained environments such as wireless embedded systems. Due to the nature of the problem, good scalability properties are also expected requirements of the proposed systems. Providing implementation results & demonstrating the applicability of the proposed solutions are among the
essentials. Metrics to evaluate different aspects of lightweight security solutions and combined metrics for overall evaluations thereof for a given application scenario are useful for implementers and engineers. Compactness and efficiency are the properties which are commonly sought.


Topics of interest include, but are not limited to:

– Design, analysis and implementation of lightweight cryptographic
protocols & applications
– Cryptographic hardware development for constrained domains
– Design, analysis and implementation of security & privacy solutions
for wireless embedded systems
– Design, analysis and implementation of lightweight  privacy-preserving
protocols & systems
– Design and analysis of fast and compact cryptographic algorithms
– Wireless network security for low-resource devices
– Low-power crypto architectures
– Scalable protocols and architectures for security and privacy
– Formal methods for analysis of lightweight cryptographic protocols
– Security and privacy issues in RFID and NFC
– Embedded systems security
– PUF based crypto protocols
– Security of ubiquitous and pervasive computing
– Side channel analysis and countermeasures on lightweight devices
– Efficient and scalable cryptographic protocols for the Next Generation
Secure Cloud

Instructions for Authors

The submission must be anonymous with no author names, affiliations or obvious references. Only original unpublished work should be included in the manuscript. The length of the manuscripts must be at most 12 pages excluding references and appendices. The text should be in a single-column format, at least 11-point fonts, and have reasonable margins. The length of the final version will be at most 20 pages including references and appendices, and compliant with Springer’s LNCS template. Each paper conforming to these specifications will be reviewed by at least three reviewers.

Submission website: http://www.easychair.org/conferences/?conf=lightsec13.


A limited number of stipends are available to students having an accepted paper that they will present. Requests for stipends should be addressed to the general chair.

Invited Speakers

Jacques Stern, ENS, France

(Other invited speakers will be announced later)

Program Committee

Onur Aciicmez, Samsung, USA
Jean-Philippe Aumasson, NAGRA, Switzerland
Paulo Barreto, University of Sao Paulo, Brazil
Lejla Batina, Radboud University Nijmegen, The Netherlands
Guido Bertoni, STMicroelectronics, Italy
Mike Burmester, Florida State University, USA
Roberto Di Pietro, Universita di Roma Tre, Italy
Orr Dunkelman, University of Haifa, Israel
Kris Gaj, George Mason University, USA
Helena Handschuh, Intrinsic-ID, USA
Julio Hernandez-Castro, Portsmouth University, UK
Marc Joye, Technicolor, France
Pascal Junod, HEIG-VD, Switzerland
Mehmet Sabir Kiraz, TUBITAK BILGEM UEKAE, Turkey
Cetin Kaya Koc, UCSB, USA
Xuejia Lai, Shanghai Jiao Tong University, Japan
Albert Levi, Sabanci University, Turkey
Thomas Pedersen, TUBITAK BILGEM UEKAE, Turkey
Josef Pieprzyk, Macquarie University, Australia
David Pointcheval, CNRS/ENS/INRIA, France
Axel Poschmann, Nanyang Technological University, Singapore
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Arash Reyhani-Masoleh, University of Western Ontario, Canada
Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Francisco Rodriguez-Henriquez, CINVESTAV-IPN, Mexico
Erkay Savas, Sabanci University, Turkey
Mike Scott, CertiVox labs, Ireland
Ali Aydin Selcuk, Bilkent University, Turkey
Francois-Xavier Standaert, Universite catholique de Louvain, Belgium
Serge Vaudenay, EPFL, Switzerland
Amr Youssef, Concordia University, Canada

Organizational Committee

– Program co-Chairs:   Gildas Avoine  Université catholique de Louvain, Belgium and  Orhun Kara   TUBITAK BILGEM UEKAE, Turkey

– General Chair:  Huseyin Demirci  TUBITAK BILGEM UEKAE, Turkey