{"id":8,"date":"2019-10-08T15:55:32","date_gmt":"2019-10-08T15:55:32","guid":{"rendered":"https:\/\/stage.in.nau.edu\/cybersecurity\/?page_id=2"},"modified":"2023-04-21T17:53:19","modified_gmt":"2023-04-21T17:53:19","slug":"home","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/cybersecurity\/","title":{"rendered":"Cybersecurity Homepage"},"content":{"rendered":"<h1>Cybersecurity at NAU<\/h1>\n<h2>Summary<\/h2>\n<p>The focus in cybersecurity at NAU is a multidisciplinary effort and is a part of the department of Applied Physics and Material Science as well as the School of Informatics, Computing, and Cyber Systems (SICCS) within the College of Engineering Informatics, and Applied Sciences. Approximately $10M in research funds were secured from NAU, Arizona Board of Regent, the National Science Foundation, the US Army, the Navy, and Industry. About 24 students are involved in the cybersecurity team, including 16 PhD students. In the last four years, the team published 39 papers and 49 invention disclosures. Three graduate classes are offered: INF638, \u201cElements of Cryptography\u201d;\u00a0 INF639, \u201cThe Use of Nanotechnologies for Cybersecurity\u201d; PHY599,&#8221;Quantum and Post Quantum Cryptography&#8221; .<\/p>\n<!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Our University Partners_0\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Our University Partners <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n<ul>\n<li>Michael Gowanlock<br>\nDr. Gowanlock&rsquo;s research interests include applying high performance and parallel computing to cybersecurity problems, such as response-based cryptography to secure IoT devices, and optimizing post-quantum cryptography algorithms to exploit emerging parallel architectures.<\/li>\n<li>Bahattin Yildiz<br>\nAssociate Professor Department of Mathematics and Statistics<\/li>\n<li>Tuy Nguyen<br>\nCryptography, Homomorphic Encryption, Hardware Security, System-on-Chip Design<\/li>\n<li>Truong Nghiem<br>\nCyber-Physical Systems (CPS), machine learning and control, autonomous systems.<\/li>\n<\/ul>\n<\/body><\/html>\n\n    <\/div>\n<\/div>\n<br \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-3\">\n    <\/p>\n<!-- shortcode-number -->\n<div class=\"shortcode-number shortcode-number--left\">\n    <div class=\"shortcode-number__container\">\n        <h4>$10M<\/h4>\n        <span class=\"number-text-code\">\n\nResearch Funds\n\n<\/span>\n    <\/div>\n<\/div>\n \n<\/div>\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-3\">\n    <\/p>\n<!-- shortcode-number -->\n<div class=\"shortcode-number shortcode-number--left\">\n    <div class=\"shortcode-number__container\">\n        <h4>56<\/h4>\n        <span class=\"number-text-code\">\n\nPublished Papers\n\n<\/span>\n    <\/div>\n<\/div>\n\n<\/div>\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-3\">\n    <\/p>\n<!-- shortcode-number -->\n<div class=\"shortcode-number shortcode-number--left\">\n    <div class=\"shortcode-number__container\">\n        <h4>49<\/h4>\n        <span class=\"number-text-code\">\n\nInvention Disclosures\n\n<\/span>\n    <\/div>\n<\/div>\n\n<\/div>\n<\/div><\/p>\n<h2>Research\u00a0Programs<\/h2>\n<p>The areas of research at NAU in cybersecurity include the use of nanotechnologies to offer higher levels of cybersecurity and novel cryptographic protocols based on ternary computing: public key infrastructures, digital signatures for blockchains, post quantum cryptographic schemes, quantum key distribution, use of high performance computing (HPC), password managers, and keyless encrypting devices.\u00a0The active research programs are:<\/p>\n<ul>\n<li>Research programs funded by the Army Research Lab (ARL): \u201cMethods to encrypt and authenticate digital files in distributed networks and zero-trust environments \u201d<\/li>\n<li>Research effort funded by\u00a0CipherLoc: \u201cUse of Physically Unclonable Functions\u00a0(PUFs)\u00a0for Polymorphic Cryptography\u201c<\/li>\n<li>Research effort funded by BRIDG:\u00a0\u201cDevelopment of Low Power Memristors\u201d<\/li>\n<li>Research effort funded by NSF\u2019s:\u00a0\u201cPower Effective Error Correcting Methods for ReRAM-based PUFs\u201d<\/li>\n<li>From 2016 to 2019,\u00a0a multi-university grant\u00a0(NAU-ASU-UA)\u00a0\u00a0funded\u00a0by Arizona Board of Regents:\u00a0\u201cNanotechnologies for Cybersecurity\u201d<\/li>\n<li>Leveraging the\u00a0start up\u00a0funds approved by the President of the university from 2016 to 2020,\u00a0other\u00a0active\u00a0areas\u00a0of\u00a0research\u00a0include: \u201cNoise Induced Cryptography with High\u00a0Performance Computing\u201d,\u00a0\u201cSecuring Digital Signature for Blockchain Technologies\u201d, and \u201cThe Use of Ternary Computing for Quantum Key Distribution, Polymorphic Encryption\u201d.<\/li>\n<\/ul>\n<p>A major project was approved by both the US Air Force and the Navy ($5.4M) to fund the following projects from 2019 to 2022:<\/p>\n<ul>\n<li>\u201cUnequally Powered Cryptography with High Performance Computing\u201d<\/li>\n<li>\u201cHash-based Cryptography\u00a0with PUFs&#8221;<\/li>\n<li>\u201cSecuring Quantum Key Distribution\u201d<\/li>\n<li>\u201cKeyless Encrypting Devices with Memristors\u201d<\/li>\n<li>\u201cTernary Addressable Public Key Infrastructures\u201d<\/li>\n<li>\u201cArchitectures for Computing Diversity\u201d<\/li>\n<li>\u201cRadiation Effects on Memristor-based PUFs\u201d<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Securing Blockchain<\/h2>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/V8yOzcAn1sc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.csiac.org\/podcast\/highly-secured-blockchain-technology-for-strategic-supply-chain-management\/#comments\" target=\"_blank\" rel=\"noopener noreferrer\">CSIAC Video Link<\/a><\/p>\n<p>&nbsp;<\/p>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<!-- shortcode-image-callout -->\n<span class=\"shortcode-image-callout shortcode-image-callout--center\">\n    <a href=\"https:\/\/in.nau.edu\/cybersecurity\/graduate-courses\/\">    <span class=\"shortcode-image-callout__outer-container\">\n        <span class=\"shortcode-image-callout__container\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-26 size-landscape-image\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/8065_Engineering_20190729-464x348.jpeg\" alt=\"\" width=\"464\" height=\"348\">\n                        <span class=\"shortcode-image-callout__header-container\">\n                <span>Graduate Courses<\/span>\n            <\/span>\n                    <\/span>\n            <\/span>\n    <\/a><\/span>\n\n<p>\n<\/div>\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<!-- shortcode-image-callout -->\n<span class=\"shortcode-image-callout shortcode-image-callout--center\">\n    <a href=\"https:\/\/in.nau.edu\/cybersecurity\/our_team\/\">    <span class=\"shortcode-image-callout__outer-container\">\n        <span class=\"shortcode-image-callout__container\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-27 size-landscape-image\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/58A3038_Chris_Coffey_20171208-464x348.jpeg\" alt=\"\" width=\"464\" height=\"348\">\n                        <span class=\"shortcode-image-callout__header-container\">\n                <span>Meet our Researchers<\/span>\n            <\/span>\n                    <\/span>\n            <\/span>\n    <\/a><\/span>\n\n<p>\n<\/div>\n<\/div><\/p>\n<h1><a href=\"https:\/\/in.nau.edu\/cybersecurity\/research-news\/\">Research News<\/a><\/h1>\n<h4 class=\"title\">AFRL partners with Northern Arizona University, DOD labs, industry to develop nanotechnology solutions to cyberattacks and cyber warfare<\/h4>\n<div>\n<div class=\"da_related_item\">Personnel from the Air Force Research Laboratory joined dozens of industry and military partners at Northern Arizona University Feb. 25 to discuss a multimillion-dollar cybersecurity project headed by Professor Bertrand Cambou.<\/div>\n<div class=\"da_black\">\n<p>Cambou, a professor of nanotechnology and cybersecurity in the School of Informatics, Computing, and Cyber Systems (SICCS), is the principal investigator on a grant from the U.S. Air Force to develop nanotechnology solutions to cyberattacks and cyber warfare. SICCS professor Paul Flikkema is the PI on a grant aimed at developing hardware for computer diversity. Together, the grants total $6.3 million and include a dozen researchers and students at NAU.<a href=\"https:\/\/www.wpafb.af.mil\/News\/Article-Display\/Article\/2113374\/afrl-partners-with-northern-arizona-university-dod-labs-industry-to-develop-nan\/\"> Read More.<\/a><\/p>\n<h4 class=\"entry-title\">Cybersecurity team at NAU testing ternary computing to secure blockchain technology for cryptocurrency and other applications<\/h4>\n<p>A team of cybersecurity researchers from NAU\u2019s\u00a0<a href=\"https:\/\/nau.edu\/school-of-informatics-computing-and-cyber-systems\/\">School of\u00a0Informatics, Computing and Cyber Systems<\/a>, led by professor of practice\u00a0<strong>Bertrand Cambou<\/strong>, was recently awarded a $125,000 grant by the U.S. Air Force Research Lab (AFRL) to study how to apply NAU\u2019s technology to secure the blockchain with novel digital signature schemes. <a href=\"https:\/\/nau.edu\/nau-research\/cybersecurity-team-at-nau-testing-ternary-computing-to-secure-blockchain-technology-for-cryptocurrency-and-other-applications\/\">Read More.<\/a><\/p>\n<\/div>\n<\/div>\n<h4 class=\"entry-title\">NAU electrical engineers to lead development, commercialization of next-gen cybersecurity solutions for Internet of Things<\/h4>\n<p class=\"p1\">A team of electrical engineers, led by assistant professor and principal investigator\u00a0<strong>Fatemeh Afghah<\/strong>\u00a0of Northern Arizona University\u2019s\u00a0<a href=\"https:\/\/nau.edu\/school-of-informatics-computing-and-cyber-systems\/\"><span class=\"s1\">School of Informatics, Computing, and Cyber Systems<\/span><\/a>\u00a0(SICCS), was recently awarded a $750,000 grant by the National Science Foundation\u2019s\u00a0<a href=\"https:\/\/www.nsf.gov\/eng\/iip\/pfi\/index.jsp\"><span class=\"s1\">Partnerships for Innovation Program<\/span><\/a> to develop and commercialize a next-generation cryptosystem, or security platform, capable of protecting IoT devices from cybersecurity attacks through more advanced authentication procedures. The NAU team, which includes professor of practice\u00a0<strong>Bertrand Cambou<\/strong>\u00a0and assistant professor\u00a0<strong>Abolfazl Razi<\/strong>, will collaborate with Michael Kozicki and Hugh Barnaby of Arizona State University to enhance security solutions used in e-commerce, banking, smart cities, supply chains, smart health, machine-to-machine communications and the IoT. <a href=\"https:\/\/nau.edu\/nau-research\/nau-electrical-engineers-to-lead-development-commercialization-of-next-gen-cybersecurity-solutions-for-internet-of-things\/\">Read More.<\/a><\/p>\n<div>\n<div class=\"da_black\">\n<h4 class=\"entry-title\" tabindex=\"0\">NAU cybersecurity expert elected senior member of the National Academy of Inventors<\/h4>\n<p>The\u00a0<a href=\"https:\/\/academyofinventors.org\/\">National Academy of Inventors<\/a>\u00a0(NAI) has named Northern Arizona University professor of practice\u00a0<strong>Bertrand Cambou<\/strong> one of 66 academic inventors to the inaugural class of NAI senior members. NAI is a member organization comprised of U.S. and international universities as well as governmental and nonprofit research institutes, with more than 4,000 members spanning more than 250 institutions worldwide. <a href=\"https:\/\/news.nau.edu\/cambou-national-academy-of-inventors\/\">Read More.<\/a><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><\/p>\n<p><!-- shortcode-image-callout -->\n<span class=\"shortcode-image-callout shortcode-image-callout--center\">\n    <a href=\"https:\/\/in.nau.edu\/cybersecurity\/publications\/\">    <span class=\"shortcode-image-callout__outer-container\">\n        <span class=\"shortcode-image-callout__container\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-31 size-landscape-image\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/58A1630Symposium04262019-464x348.jpeg\" alt=\"\" width=\"464\" height=\"348\">\n                        <span class=\"shortcode-image-callout__header-container\">\n                <span>Publications<\/span>\n            <\/span>\n                    <\/span>\n            <\/span>\n    <\/a><\/span>\n<\/p>\n<p><\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity at NAU Summary The focus in cybersecurity at NAU is a multidisciplinary effort and is a part of the department of Applied Physics and Material Science as well as the School of Informatics, Computing, and Cyber Systems (SICCS) within the College of Engineering Informatics, and Applied Sciences. Approximately $10M in research funds were secured [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"my-templates\/home-page.php","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":24,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":538,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/8\/revisions\/538"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}