General context The aim of this internship is to study and implement masking countermeasures against side channel attacks on post-quantum cryptography algorithms. Side-channel attacks Side-channel attacks make it possible to track instructions executed or data manipulated by a processor by analysing its power consumption or electromagnetic emissions. Defending against these attacks is crucial because of their speed (just a few seconds on a vulnerable target!) in recovering an encryption key. Masking counter-measures, and their application to post-quantum cryptography Masking is a commonly used defence approach which involves encoding the encryption key by mixing it with random numbers. Operations such as exclusive or (Boolean masking) or addition (arithmetic masking) are commonly used to carry out this mixing. The encryption algorithm is then performed using the encoded data. The application of masking to implementations of post-quantum algorithms is the subject of active research in the state of the art, particularly in order to improve performance. The joint use of Boolean and arithmetic masking is sometimes necessary, leading to costly conversions between these two types of masking. Internship goals We want to develop masked implementations of post-quantum cryptography algorithms, and to optimise these implementations. In particular, a new technique to speed up conversion between masking schemes will be investigated. During the internship, the candidate will implement the countermeasure on one or more post-quantum cryptography algorithms, then evaluate the security provided by carrying out electromagnetic measurements on an embedded system. He/she will also carry out measurements of execution time and code size to determine the impact of the countermeasure on performance. The internship can be adapted according to the candidate's wishes, and can be followed by a PhD. Desired experience/skills The candidate must have a thorough knowledge of computing, particularly programming in the C language. Experience or knowledge in the following areas would be an advantage, but is not strictly required: - Side-channel attacks - Post-quantum cryptography algorithms - Embedded software development - Assembly code
CEA (Commissariat à l'énergie atomique et aux énergies alternatives) is a leading french research institute: in 2016 it was recognised as the world's most innovative research institute by Reuters (https://www.reuters.com/article/us-innovation-rankings/the-worlds-most-innovative-research-institutions-idUSKCN0WA2A5 ). Its technology research division, based in Grenoble and near Paris, specialises in information technology and renewable energies. The internship will take place at the CEA-LIST institute in Grenoble (France). The student will join a multidisciplinary team comprising experts in embedded systems, cyber-security for the Internet of Things and hardware design.
This position is aimed at students seeking an ambitious technical internship, eager to gain significant experience in industry-related technological research. It is particularly well-suited to students considering a doctorate, with new funded positions offered each year within the department. The internship is aimed at students in their final year of engineering school (or Master 2) in computer science or microelectronics, or equivalent levels, preferably with a specialization in processor systems/architecture or formal methods. Knowledge of micro-architecture or cybersecurity is an asset, but not a prerequisite. A strong capacity for personal work, ability to work in a team and motivation to take on technical challenges are essential. In line with CEA's commitment to integrating people with disabilities, this job is open to all.
Bac+5 - Master 2
English Fluent,French Fluent
Talent impulse, the scientific and technical job board of CEA's Technology Research Division
© Copyright 2023 – CEA – TALENT IMPULSE - All rights reserved