Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abdel Alim Kamal is active.

Publication


Featured researches published by Abdel Alim Kamal.


international conference on emerging security information, systems and technologies | 2010

Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images

Abdel Alim Kamal; Amr M. Youssef

Cold boot attack is a side channel attack which exploits the data remanence property of random access memory (RAM) to retrieve its contents which remain readable shortly after its power has been removed. Given the nature of the cold boot attack, only a corrupted image of the memory contents will be available to the attacker. In this paper, we investigate the use of an off-the-shelf SAT solver, CryptoMinSat, to improve the key recovery of the AES-128 key schedules from its corresponding decayed memory images. By exploiting the asymmetric decay of the memory images and the redundancy of key material inherent in the AES key schedule, rectifying the faults in the corrupted memory images of the AES-128 key schedule is formulated as a Boolean satisfiability problem which can be solved efficiently for relatively very large decay factors. Our experimental results show that this approach improves upon the previously known results.


international conference on microelectronics | 2009

An FPGA implementation of the NTRUEncrypt cryptosystem

Abdel Alim Kamal; Amr M. Youssef

The NTRU encryption algorithm, also known as NTRUEncrypt, is a parameterized family of lattice-based public key cryptosystems. Both the encryption and decryption operations in NTRU are based on simple polynomial multiplication which makes it very fast compared to other alternatives such as RSA, and elliptic-curve-based systems. Recently, the NTRU system has been accepted to the IEEE P1363 standards under the specifications for lattice-based public-key cryptography (IEEE P1363.1). In this paper, we investigate several hardware implementation options for the NTRU encryption algorithm. In particular, by utilizing the statistical properties of the distance between the non-zero elements in the polynomials involved in the encryption and decryption operations, we present an architecture that offers different area-speed trade-off and analyze its performance. A prototype for the proposed design is implemented using the virtex-E xcv1600e-8-fg860 FPGA chip.


availability, reliability and security | 2012

A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem

Abdel Alim Kamal; Amr M. Youssef

Scan-based Design-for-Test (DFT) is a widely deployed technique for testing hardware chips. Using this approach, all flip-flops in the design under test are connected to a scan chain where their states can be scanned out through this chain during the testing phase. Scan-based side channel attacks exploit the information obtained by analyzing the scanned data in order to retrieve secret information from cryptographic hardware devices that are designed with this testability feature. The NTRU encryption algorithm (NTRUEncrypt) is a parameterized family of lattice-based public key cryptosystems which has recently been accepted to the IEEE P1363 standards under the specifications for lattice-based public-key cryptography. In this paper, we present a scan-based side channel attack on NTRUEncrypt hardware implementations that employ scan based DFT techniques. Our attack determines the scan chain structure of the polynomial multiplication circuits used in the decryption algorithm which allows the cryptanalyst to efficiently retrieve the secret key.


Cryptography and Communications | 2012

Fault analysis of the NTRUSign digital signature scheme

Abdel Alim Kamal; Amr M. Youssef

We present a fault analysis of the NTRUSign digital signature scheme. The utilized fault model is the one in which the attacker is assumed to be able to fault a small number of coefficients in a specific polynomial during the signing process but cannot control the exact location of the injected transient faults. For NTRUsign with parameters (N, q = pl,


international conference on microelectronics | 2008

An area optimized implementation of the Advanced Encryption Standard

Abdel Alim Kamal; Amr M. Youssef

\mathcal{B}


international conference on microelectronics | 2009

An FPGA implementation of AES with fault analysis countermeasures

Abdel Alim Kamal; Amr M. Youssef

, standard,


international symposium on signals, circuits and systems | 2009

An area-optimized implementation for AES with hybrid countermeasures against power analysis

Abdel Alim Kamal; Amr M. Youssef

\mathcal{N}


Journal of Cryptographic Engineering | 2013

Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks

Abdel Alim Kamal; Amr M. Youssef

), when the attacker is able to skip the norm-bound signature checking step, our attack needs one fault, succeeds with probability


grid computing | 2010

Enhanced implementation of the NTRUEncrypt algorithm using graphics cards

Abdel Alim Kamal; Amr M. Youssef

\approx 1-\frac{1}{p}


availability, reliability and security | 2013

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal; Roger Zahno; Amr M. Youssef

and requires O((qN)t) steps when the number of faulted polynomial coefficients is upper bounded by t. The attack is also applicable to NTRUSign utilizing the transpose NTRU lattice but it requires double the number of fault injections. Different countermeasures against the proposed attack are investigated.

Collaboration


Dive into the Abdel Alim Kamal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge