• Design and cryptanalysis of block ciphers, development of SAFER+ and SAFER++ algorithms. SAFER+ was one of the candidates for Advanced Encryption Standard and is chosen as an algorithm for a message authentication for BLUETOOTH technology – the main technology for the short-range wireless networking. SAFER++ was the finalist candidate algorithm for the New European Schemes for Signature, Integrity and Encryption project.
  • Development of fast multiplication algorithm for public key cryptosystems including (Diffie-Hellman, RSA and Elliptic Curve cryptosystems), which doubles the speed of public-key operations for hardware and saves the operations time for about 40% in software.
  • Development of fast algorithms for Elliptic Curve cryptosystems.
  • Development of an alternative ElGamal type of public key encryption algorithm which will be more efficient for broadcast encryption

Recent Results

  • Development of new, efficient public key encryption algorithm and digital signature based on polynomials
  • Development of new E-voting schemes using cryptographic techniques
  • Development, evaluation and security analysis of novel methods and approaches of password generation from noisy biological data including digital processing of biological data
  • Development of a new white box encryption algorithm. The proposed white box cryptosystem has been proven to be secure against all attacks successfully applied to AES-based cryptosystems to date
  • Development of efficient oblivious transfer protocols based on White box cryptography

Directions for current and near future research

  • Research on problems connected with security of cloud computing, in particular related to development of efficient search over encrypted data and homomorphic encryption methods
  • Development and implementation of identity-based encryption scheme based on symmetric cryptography with applications in DRM, key management, secure E-mail infrastructure and cloud computing.
  • Construction of new cryptosystems based on permutation polynomials
  • Development, implementation and security analysis of proprietary 256 bit block encryption algorithm.
  • Research on lightweight cryptography

Related Publications

  1. Khachatrian and M.Kuregian, “Note on LUCAS Public-key Algorithms and Key Exchange for Broadcast Applications”- Proceedings. of the Second INTAS International Seminar on Coding Theory and Combinatorics, Essen, Germany, April 9-11, (1997), 11-17
  2. L. Massey, G. H. Khachatryan, M. K. Kyuregian, “Nomination of SAFER+ as Candidate Algorithm for the Advanced Encryption Standard (AES)”, NIST AES Proposal, 1998
  3. L. Massey, G. H. Khachatryan, M. K. Kyuregian, “Nomination of SAFER+ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE), Submission document from Cylink Corporation, 2000
  4. Khachatrian, M.Kuregian, K.Ispirian, J.Massey “Differential analysis of SAFER++ algorithm”- Second NESSIE workshop, Egham, UK, September 12-13, (2001)
  5. Khachatrian, M.Kuregian, K.Ispirian, J.Massey, “Fast Multiplication of Integers for Public-Key Cryptosystems” – Lecture Notes in Computer Science. Selected Areas in Cryptography, LNSC 2259, Toronto, (2001), 245-254
  6. Khachatrian and M.Kuregian “Fast Algorithms for Elliptic Curve Cryptosystems” Second International Conference on Computer Science & Information Technologies Yerevan Armenia, September, 2001, (194-199)
  7. Khachatrian, M.Kuregian “ New Public-key encryption algorithm ” Proceedings of the 10-th International Symposium on Communication Theory & Applications, Ambleside, UK, July 12-15, (2009)
  8. Khachatrian, A. Jivanyan, Secure and safe E-voting system based on public key cryptography . Proceedings of Russian-German- Armenian workshop Applications of information Theory, Coding and Security. Yerevan, Armenia April 14-16, 2010 pp. 25-30.
  9. Khachatrian, A. Jivanyan “ New E-voting protocol based on voters secrets “ Eight International Conference on Computer Science & Information Technologies Yerevan Armenia, September, 2011 p.p. 15-18
  10. Khachatrian, H. Khasikyan “Correlation-Based Password Generation from Fingerprints” “Information Models & Analyses” (IJIMA) Volume 1 Number 2, 2012, pages 123-133.
  11. Khachatryan, A. Jivanyan, H. Khasikyan, Alignment-Free Fuzzy Vault Scheme for Fingerprints 9th International Conference on Computer Science and Information Technologies CSIT 2013″ , 2013, Yerevan, Armenia
  12. Khachatryan, H. Khasikyan Bindings secrets with biological data: How close can we get?, Eighth Asian-European Workshop on Information Theory Fundamental Concepts in Information Theory, Kamakura, Kanagawa, JAPAN May 17-19, 2013
  13. Khachatrian, M. Kuregian “A New public key system based on permutation polynomials” Proceedings of IEEE workshop on Cloud Engineering March 10-14 Boston USA, 2014, pp. 540-543
  14. Khachatrian. “A new public key cryptosystem based on polynomials over finite fields GF(2)” (submitted for publication)
  15. Khachatrian, M. Kuregian, S. Abrahamyan, A. Jivanyan, M. Karapetyan, A. Oleynik Design and cryptanalysis of secure white-box encryption based on SAFER+ algorithm
  16. Jivanyan, G. Khachatrian “ Efficient Oblivious Transfer Protocols based on White-Box Cryptography “ (submitted for publication )

Completed projects

1. Project with NTX Research, Paris, France – “Implementation of e- password solution and Erindale cryptographic hash algorithm”- 01.01.2001- 12.31. 2011
2. Grant from Volkswagen Foundation “ Application of Security to Biometrics and Communications”- 07.01.2011-12.31.2013
3. Project with Samsung corporation visual Display Division – “Design of a fast runtime integrity solution” 12.01.2011-5.31.2012
4. Project with Samsung Research center in Ukraine (SURC)- “Design of data transformation algorithm”- 6.01-2012- 11.30.2012
5. Project with SURC- “Components of data protection Engine”-5.01.2013-10.31.2013

Current projects

  1. Project with Mentor Graphics Corporation “Development and implementation of waveform storage and compression algorithm” – 01.01.2014-12.31-2014
  2. Project with SURC “Secure search over encrypted data” 07.01.2014 – 10.31.2014

Team members

Gurgen Khachatrian
Full member of Armenian National Academy of Sciences. Doctor of Sciences, Professor , Team leader

Melsik Kuregian
PhD, Senior Cryptographer. Co-author of SAFER+ and SAFER++ algorithms. Design and Cryptanalysis of Block ciphers, Development and security analysis of White box encryption. Development of fast algorithms applicable to RSA, Elliptic curve and other cryptosystems.

Aram Jivanyan
PhD, Software development leader. Development, security analysis and software implementation of cryptographic protocols and white box encryption schemes. Development of E-voting systems using cryptography.

Sergey Abrahamyan
PhD, security analysis and software implementation of block ciphers, Development and security analysis of White box encryption.

Martun Karapetyan
PhD student. Software development and security analysis of White box encryption

Knarik Kuregian
PhD student, Software implementation of cryptographic protocols and algorithms. Analysis of cryptography related patents.

Hovik Khasikyan
PhD student, Software implementation of block cipher algorithms, development of biometric authentication algorithms. FPGA design.

Mihran Hovsepyan
PhD student. Software implementation and analysis of secure search algorithms.

Sergey Chidemyan
PhD student. Development of biometric authentication algorithms

David Danoyan
PhD student. Development and implementation of secure function evaluation algorithms

Tigran Sokhakyan
PhD student. Development and implementation of secure function evaluation algorithms

Nanar Chahverdian
PhD student. Analysis and implementation of secure search algorithms

Anna Asmangulyan
Master degree AUA. Software implementation of block cipher algorithms. Analysis of secure search algorithms. Development of biometric authentication algorithms