Securing our data and safeguarding our privacy.
The Cryptography, Security, and Privacy (CrySP) research group carries out research in a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness and usability in deployed systems. Some examples are:
- (Distributed) cryptographic protocols. Designing interactive protocols to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes, identification schemes, broadcast encryption and oblivious transfer.
- Efficient cryptographic algorithms and their implementation.
- Designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes, signature schemes, message authentication codes, key establishment protocols, and pairing-based cryptography.
- Cryptographic hash functions. Analyzing the security of iterated design techniques and the random oracle model and constructing families of universal hash functions.
- Privacy-preserving communications networks. Creating privacy-preserving communications networks with better security, privacy, efficiency, and scalability properties than existing ones.
- Off-the-record messaging. Improving the user interface, robustness, and group communication abilities of Off-the-Record Messaging, or OTR.
- See the CrySP website for more.
