Avatar

Friedrich Wiemer

PhD
Security Expert In-Vehicle Communication
CEO and Co-Founder

Bosch

cryptosolutions

Biography

Friedrich did his PhD at Gregor Leander’s Workgroup of Symmetric Cryptography at the Horst Görtz Institute for IT-Security, Ruhr University Bochum. His research interests include the design and analysis of cryptographic schemes, in particular symmetric primitives such as block ciphers. Together with Gregor, Friedrich founded cryptosolutions, providing excellent cryptographic consulting services.

At Bosch, Friedrich is responsible for predevelopment activities in the context of security for in-vehicle networks, focusing especially on Automotive Ethernet as well as CAN. Friedrich represents Bosch in the Open Alliance TC17 (Automotive Profile for MACsec), is the main editor of CAN in Automation 613-2 (CANsec) and contributes to IEEE 802.1AE.

When he needs a change from the mathematics, he devotes his time to photography, or to tinker with technical projects. Friedrich occasionally contributes to the SageMath computer algebra system and is a founding member of the FluxFingers e.V. CTF team.

Interests

  • Cryptographic Protocols
  • Symmetric Cryptanalysis
  • Symmetric Cryptography
  • Hardware Development
  • Photography

Education

  • PhD in Symmetric Cryptography, 2019

    Ruhr University Bochum

  • MSc in IT-Security, 2016

    Ruhr University Bochum

  • BSc in IT-Security, 2013

    Ruhr University Bochum

Experience

 
 
 
 
 

Security Expert In-Vehicle Communication

Bosch

Apr 2020 – Present Stuttgart
 
 
 
 
 

CEO and Co-Founder

cryptosolutions

Apr 2019 – Present Essen

Responsibilities include

  • Cryptanalysis
  • Cryptographic Design

of cryptographic schemes and the organisation and realisation of trainings.

 
 
 
 
 

Research Assistant and PhD Student

Ruhr University Bochum

May 2016 – Mar 2020 Bochum
Besides the research for my PhD thesis, I gave classes for students and participated in the faculties self-administration.
 
 
 
 
 

Student Research Assistant and Qualifying Fellow

Ruhr University Bochum

Dec 2011 – Apr 2016 Bochum

During my studies I worked as a student research assistant on several projects, in particular the following two:

  1. “High-Speed Implementation of bcrypt Password Search using Special-purpose Hardware”, where I developed a VHDL bcrypt core and evaluated its password hashing rate on a FPGA.
  2. “Parallel Implementation of BDD Enumeration for LWE”, where I developed a highly parallel C++ implementation of a CVP algorithm and evaluated its speedup for applications in the cryptanalysis of lattice-based cryptographic schemes.

Recent Publications

Enabling Secure Communication for Automotive Endpoint-ECUs through Lightweight-Cryptography

Enabling secure communication to and from endpoint-ECUs in automotive E/E architectures is crucial, as e.g. shown by recent attacks …

Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication

The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum …

Autocorrelations of vectorial Boolean functions

Recently, Bar-On et al. introduced at Eurocrypt’19 a new tool, called the differential-linear connectivity table (DLCT), which allows …

PRINCEv2 - More Security for (Almost) No Overhead

In this work, we propose tweaks to the PRINCE block cipher that help us to increase its security without changing the number of rounds …

Recent & Upcoming Talks

The SMEP Attack

Automotive switches offer management interfaces for reconfiguration via Ethernet, making these interfaces critical security targets. …

Foundational Security for Your Real-Time Autonomous System Network

Real-time autonomous systems, ranging from vehicles to robots and industrial control systems, rely on robust and secure communication …

Security in Zone-based E/E Architectures

The inner-vehicles network, i.e. the E/E architecture, faces a huge transition: from a Domain-centralized one, where Electronic Control …

Cryptanalysis of Clyde and Shadow

We discuss the choice of round constants, subspace trail attacks and division properties for our NIST submission Spook.

BISON – Instantiating the Whitened Swap-Or-Not Construction

We give the first practical instance – BISON – of the Whitened Swap-Or-Not construction. After clarifying inherent limitations of the …

Recent Posts

LFSR StreamCipher Challenge

Write-Up for my hack.lu 2018 challenge ‘LFSR StreamCipher’