Submitted and accepted in Period 1:
D2.1 "Report on Selected TRNG and PUF Principles"
This report represents the final version of Deliverable 2.1 of the HECTOR work package WP2. It is a result of discussions and work on Task 2.1 of all HECTOR partners involved in WP2. The aim of the Deliverable 2.1 is to select principles of random number generators (RNGs) and physical unclonable functions (PUFs) that fulfill strict technology, design and security criteria. For example, the selected RNGs must be suitable for implementation in logic devices according to the German AIS20/31 standard. Correspondingly, the selected PUFs must be suitable for applying similar security approach. A standard PUF evaluation approach does not exist, yet, but it should be proposed in the framework of the project. Selected RNGs and PUFs should be then thoroughly evaluated from the point of view of security and the most suitable principles should be implemented in logic devices, such as Field Programmable Logic Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs) during the next phases of the project.
D5.1 "Internal and External IT Communication Infrastructure and Project Website"
This deliverable briefly describes the website and its functionality. Further, it describes the tools provided within the IT infrastructure to facilitate cooperation and coordination.
D5.2 "Data Management Plan (DMP)
The purpose of the DMP is to provide an analysis of the main elements of the data management policy that will be used by the applications with regard to all the datasets that will be generated by the project. The DMP should ensure that most important aspects regarding data management, like metadata generation, data preservation, and responsibilities, are identified in an early stage of the project. This ensures that data is well-managed during the project and also beyond the end of the project. Data which will be generated in the course of the project include output data of random number generators, PUF output data, measurement data, and source code. As the DMP is an incremental tool, it will be adapted in the course of the project.
D6.1 "Risk Assessment Plan"
The risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the HECTOR project objectives. The interrelated risk assessment plan, risk identification, risk handling and monitoring were established.
D6.2 "Project Quality Plan"
This Project Quality Plan shows how quality aspects are taken into account in a variety of processes and activities within the HECTOR project. The interrelated quality processes – planning, assurance and control – were established.
Submitted in Period 2:
D2.2 “ASIC and FPGA Designs”
HECTOR deliverable D2.2 consists in the delivery of FPGA and ASIC designs for selected TRNG(s) and PUF(s). Considering that the main deliverable is of type “Demonstrator”, and that its dissemination level is “Confidential”, this accompanying report provides a short, publically-available document to summarize the D2.2 design deliveries.
D2.4 "Report on Attacks"
This report describes the joint effort of the HECTOR partners on evaluation of security characteristics of selected TRNG and PUF designs as researched during the HECTOR project.
D3.1 "Report on the Efficient Implementations of Crypto Algorithms and Building Blocks and on Cost and Benefits of Countermeasures Against Physical Attacks"
This report represents the final version of Deliverable 3.1 of the HECTOR work package WP3. It covers two main activities. First, the definition of cryptographic primitives, with a special focus on authenticated encryption and their efficient implementations in hardware. Second, the study of side-channel attacks and countermeasure for those cryptographic primitives. In this context our contribution is twofold. We analyze the attacks and propose countermeasure from the system-level viewpoint. Then we introduce a methodology for the evaluation at design-time of the sidechannel robustness of hardware implementations.
D3.3 "Report on the Security Evaluation of Cryptographic Algorithms and Countermeasures when non Ideal Hardware Building Blocks are Used"
This report is one of the main scientific outcomes of the HECTOR project and represents the final version of deliverable D3.3 of work package WP3. Together with deliverable D3.1, it is part of the WP3 proceedings and extensively discusses the research results of WP3. It covers four main activities. First, the cryptanalysis of cryptographic primitives with respect to non-ideal keys. Second, it proposes an optimization strategy for cryptographic post-processing of PUFs and TRNGs, based on a duplex-sponge construction. Third, the study of the security degradation of countermeasures in the presence of non-ideal random numbers. Fourth, it reports several new results on side channel countermeasures and the evaluation of side channel robustness at design-time, which not yet have been reported in deliverables D3.1 and D3.2.
D4.1 "Demonstrator Specification"
This deliverable contains detailed software and hardware specifications of the HECTOR demonstrator platforms as an output of task T4.1. The specifications are derived from selected applicative scenarios defined in deliverable D1.2. In particular, they concern the implementation of true random number generators, physically unclonable functions, and authenticated encryption with associated data algorithms as the main HECTOR outcomes.
D4.2 "Demonstrator Platform"
This deliverable contains the complete setup of the three HECTOR demonstrators designed in the framework of work package WP4. The specifications of each demonstrator are those described in D4.1. This document accompanying the demonstrators gives a full description of each demonstrator from motivation to user manual guide. Compliances to requirements are completed and key performance indicators highlighted.
D4.3 "Demonstrator Security Evaluation"
This report describes the security assessment of the three HECTOR demonstrators. For each demonstrator it consists of a description, evaluation scoping, a vulnerability analysis and – when applicable – a description of tests that have been done to get sufficient assurance on the security of the devices. The approach and results of selected tests are described.
D5.5 “Final Report on Data Management”
The purpose of the final report on data management is to provide an update of the analysis of the main elements of the data management policy used by the applications with regards to all the datasets that were generated by the project. The datasets collected in HECTOR include samples and statistical test results of TRNGs and PUFs, VHDL code of building blocks, measurements of passive and active physical attacks, and software to reproduce the cryptanalytic and system-level analysis conducted in HECTOR. Most important aspects regarding data management, like metadata generation, data preservation, and responsibilities, were updated compared to the initial report D5.2 (Data Management Plan) according to the outcome of the project.