Smart research: Engineering prof researching ways to keep personal information safe
The introduction of smart devices has made our personal information more vulnerable. Personal information stored on smart devices, such as our credit and debit cards, interfaces with smart card readers, which allows the readers to do more intelligent things.
鈥淭he flow of info between a smart card and the reader is something you want to protect,鈥 said Dr. Howard Heys, an electrical and computer engineering professor in the Faculty of Engineering and Applied Science. 鈥淚n fact, we assume that when we put our smart cards into smart card readers that we can trust the reader. It鈥檚 quite possible that that reader is trying to get information from the smart card that it鈥檚 not allowed to access - information that鈥檚 hidden by a cryptographic key.鈥
Dr. Heys adds that while smart cards are probably smart enough not to give out information it shouldn鈥檛, when it鈥檚 plugged into a reader, the reader could be analyzing how much power the smart card is consuming, and from the amount of power the smart card is using it is possible to find out information about the key.
鈥淵our credit card doesn鈥檛 have any power, but when it鈥檚 inserted into a reader the reader gives it power to do computations or cryptographic algorythms,鈥 he explained.
In a world where our smart cards are inserted into readers several times each day, protecting our personal information is very important, and Dr. Heys鈥 research in lightweight cryptography is helping us do just that.
Lightweight cryptography refers to the design and implementation of security algorithms that are targeted to digital hardware systems constrained in resources, such as area, power or energy. Such systems are typically embedded, as is the case in smart devices.
鈥淭he constrained nature of many embedded systems pose unique challenges for the design of system security,鈥 said Dr. Heys. 鈥淢y research investigates the design, implementation and application of lightweight cryptographic algorithms targeted to embedded systems, such as smart cards and cell phones, to ensure that information stored on the device is secure.鈥
Since many embedded systems use multiple cryptographic algorithms, it is important to examine aspects such as resource sharing to improve efficiency. In addition, Dr. Heys is investigating how the designs and implementations allow attacks, such as a smart card reader analyzing how much power a smart card is consuming, and he is exploring methods to mitigate such attacks.
鈥淲e are using digital hardware design tools,鈥 said Dr. Heys. 鈥淲e hope to create new lightweight encryption by analyzing new and existing algorithms to find areas where they are most vulnerable to attacks. We also plan to develop new and more efficient ways to implement algorithms.鈥