You are on page 1of 2

Title 1: Analysis of standard elliptic curves for the implementation of ECC Cipher in resource-

constrained environments
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the RSA
algorithm is very common. Due to the security requirements, the necessary key size of RSA is
increasing exponentially. Because of this large key size, it is not convenient to use RSA in resource-
constrained applications where computational speed, storage and bandwidth are limited. Elliptic
Curve Cryptography (ECC) is the best alternative to the traditional RSA. ECC provides the same level
of security as RSA but with reduced key size. The most important factor in the use of ECC is the
selection of the correct elliptic curve. There are different types of elliptic curves suggested by various
standards. The selection of the curve is dependent on various parameters, such as prime field size,
the shape of the curve, etc. In this project, sets of elliptic curves recommended by different
standards for cryptography will be selected, and analyses of selected curves must be done focusing
on the performance and security features. The performance of each curve has to be measured in
terms of computation time. The analysis will be performed by considering each curve for the
implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm and the Elliptic Curve Digital
Signature Algorithm (ECDSA). The analysis is carried out using SageMath, which is a free open-
source mathematics software system licensed under the GPL, using Python 3.

Title 2: Hardware Root of Trust on IoT Gateway


Gateways play a vital role on the Internet of Things (IoT) infrastructure. Gateways are widely used,
and their usage range from industries to smart homes. As they have expanded nowadays to have
internet connectivity which raises certain security issues like being exposed to various threats and
cyber-attacks such as rootkits, bootkits. Many research and developments were made to
countermeasure these problems. One of the significant developments was Root of Trust (RoT). RoT
can be enabled both by using hardware such as a chip named Trusted Platform Module (TPM) and
using software like Trusted Execution Environment (TEE). In this project, student has to enable RoT
using the chip TPM 2.0 on a product, a gateway using the TPM software stack TSS2.0.

Title 3: Development of Image Encryption Algorithm for IoT applications


IoT sensors are resource constrained devices. Providing security to these devices is a critical task.
The standard encryption schemes are not applicable because of their heavy resource consumption.
Hence, designing lightweight image ciphers using various cellular automata rule vectors are
crucial. In this project, preservation of confidentiality of physical layer to networks layer
communications has to be done.  Students would develop cryptosystems using Cellular Automata
rule vectors, and their performance and security analysis has to be done.
 
Title 4: Using a Trusted Platform Module for endpoint device security in AWS IoT Greengrass
 This project demonstrates how AWS IoT Greengrass can be integrated with a Trusted Platform
Module (TPM) to provide hardware-based endpoint device security. This integration ensures the
private key used to establish device identity can be securely stored in tamper-proof hardware
devices to prevent it from being taken out of the devices for impersonation and other malicious
activities.

Title 5: Image forgery detection using deep learning


Image forgery detection is the basic key to solve many problems, especially social problems such as
those in Facebook, and court cases. The common form of image forgery is the copy-move forgery, in
which a section of the image is copied and pasted in another location within the same image. In this
type of image forgery, it is easy to perform forgery, but more difficult to detect it, because the
features of the copied parts are like those of the other parts of the image. This project provides an
approach for copy-move forgery detection based on block processing and feature extraction from
the transforms of the blocks. In addition, a Convolutional Neural Network (CNN) will be used for
forgery detection. The feature extraction will be implemented with serial pairs of convolution and
pooling layers, and then classification between the original and tampered images will be performed
with and without transforms.

You might also like