Hoda A. Alkhzaimi, New York University Abu Dhabi
Venue Details
RM 301

Abstract: Throughout the years, designing a symmetric cipher with a specific security rationale, and designing the cryptanalytic techniques that will test the claimed security bounds went hand-in-hand to test the boundaries on the design and attack methods. This formed a continuous evolution in the approaches that cryptographic primitives are constructed to be suitable for future and current hardware environments. This seminar session is meant to shed focus on the different conventional and lightweight design approaches for block ciphers. In addition to considering different design criteria and requirements for the different layers within a certain design. It will also introduce an  overview on the possible generic, structural and statistical cryptanalytic techniques that can be used to test or reduce certain security properties within a design. We will finally look into possible connections between different cryptanalytic methods and how this can be used to utilize an effective attack model.

Bio: Hoda A.Alkhzaimi is currently a research assistant professor in New York University and the Director of Center of Cyber Security in NewYork University AD. She served in different posts for research and development in Cyber Security and Cryptology for the past years. She headed the Department of Research and Development for Cyber Security and Cryptology in different national initiatives in the United Arab Emirates along with her associations to different security initiatives nationally and internationally.  Alkhzaimi has a specific expertise in cryptology; cryptanalysis, constructing and validating security hardware and software components, constructing trusted security architectures for different environments in different products for the respective industries. HodaA.Alkhzaimi obtained her PhD inCryptanalysis from Denmark Technical University. Her current research interests include
Space, Aerospace, and UAV security, constructing and analyzing cryptographic primitives, validating and investigating links between different cryptanalytic approaches and utilizing cryptographic primitives in different cybersecurity architectures as in Internet of Things and big data analysis among ot

External Speakers