Master Thesis - Privacy-preserving encryption
Lund, Sweden
Applications have closed
Bosch Group
Moving stories and inspiring interviews. Experience the meaning of "invented for life" by Bosch completely new. Visit our international website.Company Description
At Bosch, we shape the future by inventing high-quality technologies and services that spark enthusiasm and enrich people’s lives. Our promise to our associates is rock-solid: we grow together, we enjoy our work, and we inspire each other. Join in and feel the difference.
Bosch R&D Center Lund stands for modern development in cutting edge technology in the areas of connectivity, security, mobility solutions and AI. We are growing rapidly and looking for people to join us on our mission to become the Bosch Group’s 1st address for secure connected mobility solutions. We are working on a range of interesting projects, with a particular focus on software development for the automotive industry, electrical bicycles and Internet of Things.
Job Description
A new field of Privacy Preserving data handling is the Fully Homomorphic Encryption (FHE), which has evolved rapidly the last ten years. Proof of concepts sparked more research efforts, resulting in today’s available, generic, FHE libraries.
The standard approach to process encrypted data content is to first decrypt the data. Decryption needs a secret key and secure handling of the confidential data. Fully Homomorphic Encryption instead enables evaluation of encrypted data, without having to first decrypt the data.
How can this property be used for client devices and cloud servers in the automotive setting?
Proposed solution
The focus in this thesis project is to evaluate threat models concerning FHE in a client/server setting, taking into consideration pros and cons.
We propose the following topics to be covered in the thesis:
- Study and learn the different available protocols used in FHE
- Implement one or more of the identified protocols
- Evaluate and benchmark the performance and maintenance of the implemented protocols
- Identify and document the Threat Model.
Scope of master thesis project
One or two students completing 30 credits each (20 weeks) partly onsite at the Lund office
Qualifications
Your profile
In order to be successful in the project, you:
- Are a student in Information Technology, Computer Science, Electronics, Math or similar
- Have knowledge of the programming languages C++ and Python
- Have completed one or more computer security courses
- Are self-driven, able to challenge yourself, and gain the experience needed to move the project forward
Supervisor: Anders Nilsson, Bosch RBSN/ESW25 Cyber Security
Additional Information
Your future job location offers you:
Flexible work time options, benefits and services, medical services, employee discounts, various sports and health opportunities, catering facilities, collective agreement, wellness contribution, access to local public transport, and room for creativity.
Diversity is our strength! At Bosch we look at diversity in gender, generation, nationalities and culture as our advantage. We believe mixed teams to be more successful because they utilize the potential offered by different perspectives and solution strategies. We therefore promote mixed teams at all levels and draw on the entire talent pool.
Tags: C Cloud Computer Science Encryption Internet of Things Privacy Python R&D
Perks/benefits: Flex hours Health care
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Security Operations Engineer jobs
- Open Senior Security Analyst jobs
- Open Cyber Security Architect jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Chief Information Security Officer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Specialist jobs
- Open IT Security Engineer jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open CISM-related jobs
- Open Pentesting-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open IAM-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open Malware-related jobs
- Open APIs-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open DevSecOps-related jobs
- Open CI/CD-related jobs