Christof Paar’s research while affiliated with Max Planck Institute for Security and Privacy and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (463)


Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security
  • Conference Paper

March 2025

·

2 Reads

·

Meik Dörpinghaus

·

Azadeh Sheikholeslami

·

[...]

·

Dennis Goeckel

Anti-Tamper Radio meets Reconfigurable Intelligent Surface for System-Level Tamper Detection

March 2025

·

6 Reads

Many computing systems need to be protected against physical attacks using active tamper detection based on sensors. One technical solution is to employ an ATR (Anti-Tamper Radio) approach, analyzing the radio wave propagation effects within a protected device to detect unauthorized physical alterations. However, ATR systems face key challenges in terms of susceptibility to signal manipulation attacks, limited reliability due to environmental noise, and regulatory constraints from wide bandwidth usage. In this work, we propose and experimentally evaluate an ATR system complemented by an RIS to dynamically reconfigure the wireless propagation environment. We show that this approach can enhance resistance against signal manipulation attacks, reduce bandwidth requirements from several~GHz down to as low as 20 MHz, and improve robustness to environmental disturbances such as internal fan movements. Our work demonstrates that RIS integration can strengthen the ATR performance to enhance security, sensitivity, and robustness, recognizing the potential of smart radio environments for ATR-based tamper detection


"Make the Voodoo Box Go Bleep Bloop:" Exploring End Users' Understanding and Information Needs Regarding Microchips

February 2025

·

10 Reads

Microchips are fundamental components of modern electronic devices, yet they remain opaque to the users who rely on them daily. This opacity, compounded by the complexity of global supply chains and the concealment of proprietary information, raises significant security, trust, and accountability issues. We investigate end users' understanding of microchips, exploring their perceptions of the societal implications and information needs regarding these essential technologies. Through an online survey with 250 participants, we found that while our participants were aware of some microchip applications, they lacked awareness of the broader security, societal, and economic implications. While our participants unanimously desired more information on microchips, their specific information needs were shaped by various factors such as the microchip's application environment and one's affinity for technology interaction. Our findings underscore the necessity for improving end users' awareness and understanding of microchips, and we provide possible directions to pursue this end.






Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security
  • Preprint
  • File available

December 2024

·

24 Reads

Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play a pivotal role to share encryption keys and create digital signatures. However, quantum computers threaten the security of traditional public-key cryptosystems as they can tame computational problems underlying the schemes, i.e., discrete logarithm and integer factorization. The prospective arrival of capable-enough quantum computers already threatens today's secret communication in terms of their long-term secrecy when stored to be later decrypted. Therefore, researchers strive to develop and deploy alternative schemes. In this work, evaluate a key exchange protocol based on combining public-key schemes with physical-layer security, anticipating the prospect of quantum attacks. If powerful quantum attackers cannot immediately obtain private keys, legitimate parties have a window of short-term secrecy to perform a physical-layer jamming key exchange (JKE) to establish a long-term shared secret. Thereby, the protocol constraints the computation time available to the attacker to break the employed public-key cryptography. In this paper, we outline the protocol, discuss its security, and point out challenges to be resolved.

Download



Citations (39)


... The understanding can also be affected by the individual's domain expertise in the decision-making task [83] as well as the explanation's modality (e. g., textual, visual, or interactive) [65]. Speith et al. [73] connect explainability to hardware in the context of requirements engineering, with a particular focus on microchips. Among their future research directions, they explicitly propose to explore end-users' mental models of microchips. ...

Reference:

"Make the Voodoo Box Go Bleep Bloop:" Exploring End Users' Understanding and Information Needs Regarding Microchips
Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)

... RSA exploits the difficulty of factorizing bi-prime numbers. According to Paar and Pelzl [2], RSA and in general asymmetric algorithms are not meant to replace symmetric algorithms because they are computationally costly. RSA is mainly used for secure key exchange between end nodes and often used together with symmetric algorithms such as AES, where the symmetric algorithm does the actual data encryption and decryption. ...

Introduction to Public-Key Cryptography
  • Citing Chapter
  • May 2024

... The foundation of PQC dates back to the mid-1990s when Peter Shor introduced an algorithm capable of factoring large integers and computing discrete logarithms in polynomial time on a quantum computer (Paar et al., 2024;Obioha-Val et al., 2025b). Lior (2024) argues that this discovery indicated the eventual obsolescence of widely used public-key cryptographic schemes such as RSA and Elliptic Curve Cryptography (ECC) once large-scale quantum computers become viable. ...

Post-Quantum Cryptography
  • Citing Chapter
  • May 2024

... However, the steps themselves only require quite rudimentary mathematics. For those readers interested in the mathematics, there are resources available (Easttom, 2022;Kota, et al., 2022;Paar, Pelzl, & Güneysu, 2024). Encryption and decryption, once keys have been generated and a public key is published, are actually quite simple: ...

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
  • Citing Book
  • January 2024

... However, as eye gaze data are often challenging to interpret on their own, researchers commonly supplement eye-tracking data with methods such as Retrospective Think Aloud [56]. These methods often require manual and labor-intensive segmentation and labeling of the data, which can be especially daunting for large or complex datasets [153]. While automating such processes shows promise, they still lack in precision and contextual understanding [102,149]. ...

I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering
  • Citing Conference Paper
  • May 2024

... Other works consider the RIS to facilitate eavesdropping, e.g., Chen et al. [9], Chen and Ghasempour [8], and Shaikhanov et al. [54]. Finally, Li et al. [33] have shown RISbased jamming of wireless key generation. c) Jamming Attacks: An early study on the threat of jamming in wireless communication networks is the work of Xu et al. [72], covering several attack strategies, including constant random signal jamming, deceptive jamming based on packets with valid encoding, time-pulsed jamming, and reactive jamming. ...

RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation
  • Citing Article
  • January 2024

IEEE Transactions on Information Forensics and Security

... Compared to our previous workshop version of this paper [10], we extend our work as follows. In Section 2.4, we (1) propose improvements to our approach that greatly enhance training stability, albeit achieving high performance only in a specific configuration. ...

Towards Unsupervised SEM Image Segmentation for IC Layout Extraction
  • Citing Conference Paper
  • November 2023

... However, compared to Application-Specific Integrated Circuits (ASICs), the reconfigurability of the FPGA fabric via bitstreams introduces additional security threats. Though effective protection for bitstream authenticity, integrity, and confidentiality exist in theory, their implementations often have flaws that can leak information through side-channel attacks as well as flaws in the implementation itself [1,13,14,17,22,30,32,39,42]. ...

On the Malicious Potential of Xilinx’s Internal Configuration Access Port (ICAP)
  • Citing Article
  • November 2023

ACM Transactions on Reconfigurable Technology and Systems

... Virtual Proofs of Reality. One particularly interesting application that could be realized using RISs are physical challenge-response protocols as proposed by Rührmair et al. [23] and Tobisch et al. [26], allowing remote authentication and integrity verification based on querying channel measurements corresponding to random RIS configurations. Future work should investigate whether such a system meets the requirement of hard-to-predict channel responses. ...

Remote inspection of adversary-controlled environments