prof. Ing. Róbert Lórencz, CSc.

Head of the Department of Information Security

Projects

Cryptography for Securing Electronic Devices

Program
Studentská grantová soutěž ČVUT
Code
SGS17/214/OHK3/3T/18
Period
2017 - 2019
Description
The aim of this project is research in the field of security embedded systems. Developers typically design specific cryptographic primitives for electronic devices enabling their deployment in highly unsecured environments. These primitives must be adapted to the properties of the used embedded electronic devices in order to ensure the required level of security.

Cryptology and security

Program
Studentská grantová soutěž ČVUT
Code
SGS15/120/OHK3/1T/18
Period
2015
Description
The Applicated Numerics and Cryptology research group studies various security components of information systems, especially at the research and development true random generators and physically unclonable functions, cryptoanalysis of block and stream ciphers, factorization of large numbers and efficient solving large systems of linear equations. The proposed project also addresses these thematic research areas.

Cryptology, security, and parallel computations

Program
Studentská grantová soutěž ČVUT
Code
SGS16/122/OHK3/1T/18
Period
2016
Description
This project is aimed at several aspects of security of information systems inclusing identification of potential security threats. Main topics are following: cryptoanalysis of block and stream ciphers, efficient solving large systems of linear equations with an infinite precision, and the research and development true random generators and physically unclonable functions,

Cybersecurity Innovation Hub

Program
Projects of the Ministry of Industry and Trade not included in the CEP
Provider
Ministry of Industry and Trade
Period
2023 - 2026
Description
CIH will significantly support digital transformation and application of innovation in SMEs and public administration by building a coordinated and effective ecosystem comprising top research institutions with the necessary know-how and infrastructure, specialized business clusters, professional organizations, and public authorities. This robust ecosystem will provide its beneficiaries with access to education and information on cybersecurity trends and best practices, to expert advice and state-of-the-art infrastructures to verify the suitability and security of innovative solutions under consideration and increase the availability of funds to invest in innovation. CIH will also function as a platform for cooperation and information sharing between entities in the cybersecurity market, both at the level of Czechia and the EU. This will increase the efficiency and competitiveness of the EU cybersecurity industry, the security of IT infrastructures and the strength of the EU economy.

Cybersecurity Innovation Hub

Program
Digital Europe Programme
Provider
European Commission
Code
,
Description
CIH will significantly support digital transformation and application of innovation in SMEs and public administration by building a coordinated and effective ecosystem comprising top research institutions with the necessary know-how and infrastructure, specialized business clusters, professional organizations, and public authorities. This robust ecosystem will provide its beneficiaries with access to education and information on cybersecurity trends and best practices, to expert advice and state-of-the-art infrastructures to verify the suitability and security of innovative solutions under consideration and increase the availability of funds to invest in innovation. CIH will also function as a platform for cooperation and information sharing between entities in the cybersecurity market, both at the level of Czechia and the EU. This will increase the efficiency and competitiveness of the EU cybersecurity industry, the security of IT infrastructures and the strength of the EU economy. CIH draws on partnerships and participation in international networks and builds on the success of Czech research and industry. CIH covers cybersecurity on the horizontal from various points of view (technical, legal, economic, social etc.), on the vertical CIH operates at all levels - it plays an important role in building the legislative environment, in research, commercialization and implementation of technologies, and in awareness raising and education. CIH also has links to standardization and certification that shape the cybersecurity market. This holistic approach and the ability to thoroughly map the ecosystem make CIH an attractive partner for international cooperation. This is also confirmed by its participation in 3 EU pilot research projects (Sparta, CyberSec4Europe and Concordia), cooperation with the EU and international organizations (ENISA, Europol, UN, NIST, etc.), and involvement in professional initiatives (e.g. REWIRE - capacity building in cybersecurity in the EU).

Information systems and their security

Program
Studentská grantová soutěž ČVUT
Code
SGS13/102/OHK3/1T/18
Period
2013
Description
The goal of the project is the research and development of security features of current information systems. The emphasis is placed on data and communicaton security at both hardware and software tools. Research Group Applied Numerics and Cryptography has been involved in research on various security elements of information systems. It is especially development of truly random number generators, smart card security, network security, and reverse engineering. The proposed project also addresses these thematic research areas.

Information Systems and their Security

Program
Studentská grantová soutěž ČVUT
Code
SGS14/107/OHK3/1T/18
Period
2014
Description
The goal of the project is the research and development of security features of current information systems. The emphasis is placed on data and communicaton security at both hardware and software levels. The Network Security Research Group and the Applied Numerics and Cryptography Research Group have been involved in research of various security elements and aspects of information systems. It is especially development in the area of cryptanalysis of block and stream ciphers, in network security, in smart-card security, and in reverse engineering. The proposed project also addresses these thematic research areas.

Malware detection and network security methods using AI

Program
Studentská grantová soutěž ČVUT
Code
SGS21/142/OHK3/2T/18
Period
2021 - 2022
Description
The goal of the project is the research and development of security features of current information systems. The emphasis is placed on the application of machine learning methods in various areas of information security. The proposed project addresses the following thematic research areas. It is mainly research in the field of malware detection, network security, and detection of attacks in an Active Directory environment.

Problems of Cyber Threats from the Point of View of the Czech Republic Concerns

Program
Security Research
Provider
Ministry of Interior
Code
VD20072010B13
Period
2007 - 2010
Description
The project is concerned about complex study of threats related to informatics and computer technology and their exploitation in the field. Expected outcomes of the project are not only technological solution of CSIRT and forensic methods, but also social, psychological and legal aspect of cyberspace.

Security analysis of comunication between contactless smartcards and terminal

Program
Studentská grantová soutěž ČVUT
Code
SGS11/094/OHK3/1T/18
Period
2011
Description
The aim of this project is to provide the security analysis of contactless smartcards considering the actual issue in the field of smartcard security. The main focus lays in the area of electronic wallets and contactless payment terminal security. This project will include the implementation of typical attack and analysis of potential threats. Based on this analysis, we will set basic rules for elimination of weaknesses. The outputs of the project could help improving security of the whole payment system. The project has a good future perspective and we can expect more publications on this issue.

Security analysis of contactless smartcards

Program
Studentská grantová soutěž ČVUT
Code
SGS10/120/OHK3/1T/18
Period
2010
Description
The aim of this project is to do security analysis of contactless smartcards. The analysis will consider theoretical description of attacks on the widely used card Mirafe Classic, that were published. Project will consist of the implementation of attack based on published theoretical attacks. Based on this analysis will be given suggestions on improvements of the contactless smartcards security.

Security aspects of current information technology

Program
Studentská grantová soutěž ČVUT
Code
SGS12/095/OHK3/1T/18
Period
2012
Description
The project aims to research the security of selected IT technologies with emphasis on security and communication of processed data. The research group working at the Department of Computer Systems has been long engaged in research particularly in the areas of truly random number generators, smart card security, network security and reverse engineering. The topics of the proposed project are related to these areas.

Security Solutions for Selected Cryptographic Systems and Networks

Program
Studentská grantová soutěž ČVUT
Code
SGS23/211/OHK3/3T/18
Period
2023 - 2025
Description
The project has three main goals. The first goal deals with malware detection using machine learning. The focus will be on problems of malware classification and creating and defending against adversarial samples. The second goal belongs to the field of cryptanalysis of ciphers using side channels. The research will focus on ciphers that have made it to the finals of the post-quantum cipher competition organized by NIST. The last goal will be to systematically describe blockers and barriers in deploying and using cryptographic tools.

Side channel attacks on post-quantum cryptography algorithms

Program
Promoting the mobility of researchers and workers in the framework of international cooperation in R&D
Provider
Ministry of Education, Youth and Sports
Code
8J23FR012
Period
2023 - 2024
Description
The project deals with the design (and implementation) of new side-channel attacks on the postquantum algorithms, as well as the design (and implementation) of countermeasures that will prevent these attacks.

Study of properties of residual arithmetic for solving sets of linear equations

Program
Standard projects
Provider
Czech Science Foundation
Code
GAP103/12/2377
Period
2012 - 2014
Description
Our intention is to study the properties of the multiple-modulus residual arithmetic with respect to specific numerical problems of linear algebra. One of complex problems of linear algebra suitable for our purpose is solving large systems of linear equations. This requires to create a model of a solver for performing experiments. The method of Gauss-Jordan elimination with residual pivoting is chosen as the base of the solver. In order to gain precise knowledge about the arithmetic used in the model, a hardware architecture of the model will be emulated on FPGA. This experimental solution enables us also verify the theoretical prediction about the spatial, temporal and communication complexity of the modeled solver.

Study of properties of residual arithmetic for solving sets of linear equations

Program
Standard projects
Provider
Czech Science Foundation
Code
GAP103/12/2377
Period
2012 - 2014
Description
Our intention is to study the properties of the multiple-modulus residual arithmetic with respect to specific numerical problems of linear algebra. One of complex problems of linear algebra suitable for our purpose is solving large systems of linear equations. This requires to create a model of a solver for performing experiments. The method of Gauss-Jordan elimination with residual pivoting is chosen as the base of the solver. In order to gain precise knowledge about the arithmetic used in the model, a hardware architecture of the model will be emulated on FPGA. This experimantal solution enables us also verify the theoretical predicition about the spatial, temporal and communication complexity of the modeled solver.