Your monthly Cybersecurity Speaker Series

Wed, Feb 23, 2022, 5pm CET I Soumya Banerjee (TRASNA) – Securing the Internet of Things: Latice-based crypto and side-channel attacks

On Feb 23, 2022, 5pm CET I Soumya Banerjee (TRASNA), will talk about “Securing the Internet of Things: Latice-based crypto and side-channel attacks“. Watch the trailer here:

You are cordially invited to join the free live stream on youtube and LinkedIn! To register and subscribe to the series announcements, just enter your mail address in the box on the left at Please share the link with your interested friends!


Envisaging the boom of different IoT applications across the different cyber-physical systems, set the diversified objectives according to the use-cases. The different electronic devices in a standard cyber physical systems (CPS) including IoT, CPU & peripheral devices perform electromagnetic (EM) noise emission in CPS. It is worthy to mention that the associated instruction and machine cycle of specific CPU could demonstrate the behavior and pattern of software including of any malicious activity across the CPS. There are plenty of research investigations concerning the hardware-oriented encryption. Trusted platform module (TPM), secure booting could be few proposals on the same. Therefore, side channel attacks are critical with respect to the IoT systems. In ideal situation side channel attacks (SCA) broadly demonstrate the unwanted exposure of the critical information. Hence, those exposures can be subjected to different attacks categories like power attacks, EM attacks, timely attacks etc. The challenges are manifold: e.g. size of encryption keys & signatures, time to encrypt and decrypt each communication channel and finally the amount of traffic sent over the wire to complete the process  of encrypt or decrypt. Lattice Based Cryptography (LBC) offers the base relief to replace RSA or ECC and offer you very strong security proofs based on worst-case hardness.

Watch the trailer here.

Dr. Soumya Banerjee

Dr. Soumya Banerjee, Senior Vice President Innovation (Trasna-Solutions Ltd. ) & Senior researcher, University College Cork, Ireland has been specialized with Computational Intelligence, Machine Learning, Security and Blockchain across smart & connected environmnets almost for 2 decades envisaging both research & teaching. Prior to Trasna & UCC , he was invited research professor CNRS-INSA De Lyon, France, TU Ostrava Cz Republic, CNAM-CEDRIC, Paris and still he is an adjunct senior researcher INRIA-EVA, Paris, France. He has more than 150 peer reviewd publications (IEEE, Elsevier, Springer-Verlag, et.) and he has an European patent on bio-inspired Algorithm during 2009-2011.


TRASNA SOLUTIONS is a well-known manufacturer of SIM Cards and eSIMs / eUICCs enabling amongst others the connectivity of IoT boards and IoT devices. Based is in Ireland, Germany, Bostnia, Slovenia, France & Turkey across Europe,  Trasna has its own GSMA accredited facility. Furthermore, Trasna offers solutions to address connectivity challenges across IoT paradigms. They are actively participating in industrial research &  development on Post Quantum Cryptography, Identity Mangement, Blockchain and Machine Learning to explore industrial use-csaes.

The Cyber CNI Lecture Series is a free monthly event that takes place on the last Wednesday of the month from 5:00 pm to 6:30 pm.

The event consists of a 40-minute expert presentation followed by a 30-minute discussion.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube ( and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

The COVID-19 pandemic has shown all of us the benefits of information technology. It allows us to work at a distance, to live at a distance, and most importantly, to keep in touch at a distance – with younger and older people, those closest to us, and even make new contacts.

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration:

Marc-Oliver Pahl

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.