Public Deliverables


D2.4 "Report on Attacks"

D3.3 "Report on the Security Evaluation of Cryptographic Algorithms and Countermeasures when non Ideal Hardware Building Blocks are Used"

D4.2 "Demonstrator Platform"

D4.3 "Demonstrator Security Evaluation"

Submitted in Period 2:

D4.1 "Demonstrator Specification"
This deliverable contains detailed software and hardware speci cations of the HECTOR demonstrator platforms as an output of task T4.1. The speci cations are derived from selected applicative scenarios de ned in deliverable D1.2. In particular, they concern the implementation of true random number generators, physically unclonable functions, and au- thenticated encryption with associated data algorithms as the main HECTOR outcomes.

D3.1 "Report on the Efficient Implementations of Crypto Algorithms and Building Blocks and on Cost and Benefits of Countermeasures Against Physical Attacks"
This report represents the final version of Deliverable 3.1 of the HECTOR work package WP3. It covers two main activities. First, the definition of cryptographic primitives, with a special focus on authenticated encryption and their efficient implementations in hardware. Second, the study of side-channel attacks and countermeasure for those cryptographic primitives. In this context our contribution is twofold. We analyze the attacks and propose countermeasure from the system-level viewpoint. Then we introduce a methodology for the evaluation at design-time of the sidechannel robustness of hardware implementations.

Submitted and accepted in Period 1:

D2.1 "Report on Selected TRNG and PUF Principles"
This report represents the final version of Deliverable 2.1 of the HECTOR work package WP2. It is a result of discussions and work on Task 2.1 of all HECTOR partners involved in WP2. The aim of the Deliverable 2.1 is to select principles of random number generators (RNGs) and physical unclonable functions (PUFs) that fulfill strict technology, design and security criteria. For example, the selected RNGs must be suitable for implementation in logic devices according to the German AIS20/31 standard. Correspondingly, the selected PUFs must be suitable for applying similar security approach. A standard PUF evaluation approach does not exist, yet, but it should be proposed in the framework of the project. Selected RNGs and PUFs should be then thoroughly evaluated from the point of view of security and the most suitable principles should be implemented in logic devices, such as Field Programmable Logic Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs) during the next phases of the project.

D5.2 "Data Management Plan (DMP)
The purpose of the DMP is to provide an analysis of the main elements of the data management policy that will be used by the applications with regard to all the datasets that will be generated by the project. The DMP should ensure that most important aspects regarding data management, like metadata generation, data preservation, and responsibilities, are identified in an early stage of the project. This ensures that data is well-managed during the project and also beyond the end of the project. Data which will be generated in the course of the project include output data of random number generators, PUF output data, measurement data, and source code. As the DMP is an incremental tool, it will be adapted in the course of the project.

D6.1 "Risk Assessment Plan"
The risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the HECTOR project objectives. The interrelated risk assessment plan, risk identification, risk handling and monitoring were established.

D6.2 "Project Quality Plan"
This Project Quality Plan shows how quality aspects are taken into account in a variety of processes and activities within the HECTOR project. The interrelated quality processes – planning, assurance and control – were established.

D5.1 "Internal and Eternal IT Communication Infrastructure and Project Website"
This deliverable briefly describes the website and its functionality. Further, it describes the tools provided within the IT infrastructure to facilitate cooperation and coordination.