
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 20, 2022 |
Latest Amendment Date: | May 29, 2024 |
Award Number: | 2149765 |
Award Instrument: | Standard Grant |
Program Manager: |
Sol Greenspan
sgreensp@nsf.gov (703)292-7841 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | October 1, 2022 |
End Date: | September 30, 2026 (Estimated) |
Total Intended Award Amount: | $531,947.00 |
Total Awarded Amount to Date: | $551,027.00 |
Funds Obligated to Date: |
FY 2024 = $19,080.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
438 WHITNEY RD EXTENSION UNIT 1133 STORRS CT US 06269-9018 (860)486-3622 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
438 Whitney Road Ext. Storrs CT US 06269-1133 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
01002223DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Cryptographic protocols have become an essential facilitator for the Internet and its many applications, supporting the needs of modern society. It is hard to imagine the Internet without the extensive use of applied cryptographic protocols, e.g., protocols used to secure web and email. Such protocols use and depend on the Public Key Infrastructure (PKI), which is also key to the security of other open systems such as mobile networks, Internet of Things, and blockchains. PKI provides a critical security infrastructure to achieve confidentiality, authentication, integrity and non-repudiation. However, there have been many attacks exploiting vulnerabilities of the PKI itself; PKI, in contrast to other well-known cryptographic protocols, has no security proofs or even precise definitions of security goals. As a result, systems utilizing PKI may be vulnerable. The proposed research will define security goals for PKI schemes, present PKI schemes which provably meet these goals, and present practical and efficient implementations of PKI schemes. This research will also develop the necessary theoretical tools to define security goals of cryptographic protocols and to analyze their security. The outcomes of this research will have broad benefits. Developers will benefit from the availability of open-source, provably secure PKI systems, enabling security for real-world applications. End-users will benefit from improved security guarantees and privacy. Given the global role of the Internet, society at large will benefit from a strengthened, advanced security infrastructure and PKI ecosystem and from educational efforts which will raise awareness of the importance of these topics. Furthermore, this research will support the development of a diverse cohort of graduate and undergraduate students at the University of Connecticut and Trinity College through increased research opportunities, education, and mentoring and outreach efforts.
Research efforts of this project, the results of which will significantly impact the theoretical and practical aspects of developing and deploying cryptographic protocols, are organized in three main areas: 1) Advancement of PKI theory: to define a comprehensive set of formal PKI requirements, and to design and analyze schemes to produce provably secure PKI schemes; 2) Development of PKI systems with improved security guarantees: to design, develop, and standardize provably secure PKI designs that are practical and appropriate for real-world applications; 3) Development of a framework and tools to facilitate provable security for applied cryptographic protocols under realistic models: to build a comprehensive framework that supports composability and formal verification tools for rigorous specification and analysis.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
Please report errors in award information by writing to: awardsearch@nsf.gov.