Cyber Defence and Security Research Laboratory (CyDeS)

Cyber Defence and Security Research Laboratory (CyDeS) was founded on April 15, 2014, by the METU Informatics Institute, a research authority with immense knowledge and practice experience in the field of information technology, and the Comodo Group, Inc., one of the leading companies in the world in the field of information technology and security certification, aiming to conduct research and development activities and bring together universities and industry resources. As an interdisciplinary center, CyDeS is expected to form necessary cooperation between existing cyber defence and security experience of the university and the sectorial resources.


Research Areas:

  • Cryptanalysis
  • Malware Analysis
  • Parallel Computing
  • Password Cracking
  • Randomness and Entropy Testing
  • Smart Card Analysis and Security

Group Members:

  1. Asst. Prof. Dr. Cihangir Tezcan (Principal Investigator)
  2. Prof. Dr. Nazife Baykal
  3. Aslı Başak Civek

Past Members

  1. Dr. Salva Daneshgadeh
  2. Dr. Mehrdad Mizani
  3. Erdi Kaya
  4. Asuman Şenol
  5. Erol Doğan
  6. Galip Oral Okan
  7. Burak Çelik
  8. Onur Bolel

Reports

  1. Cihangir Tezcan. On the Security of METU ID Cards and Readers. Internal Report, 2018. Updated on August 2021.

Journal Articles

  1. Ahmet Malal, and Cihangir Tezcan. FPGA-friendly compact and efficient AES-like 8 × 8 S-box. Microprocess. Microsystems, 105, p.105007 (2024)
  2. Cihangir Tezcan. Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. J. Syst. Archit., 124, p.102402 (2022)
  3. Kaan Furkan Altınok, Afşin Peker, Cihangir Tezcan, Alptekin Temizel. GPU accelerated 3DES encryption. Concurrency and Computation: Practice and Experience (2021)
  4. Cihangir Tezcan. Optimization of Advanced Encryption Standard on Graphics Processing Units. IEEE Access 9: 67315-67326 (2021)
  5. Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk. Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. IEEE Access 9: 50078-50092 (2021)
  6. Cihangir Tezcan. Analysis of Ascon, DryGASCON, and Shamash Permutations. International Journal of Information Security Science 9 (3), 172-187
  7. Gregor Leander, Cihangir Tezcan, Friedrich Wiemer. Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptology. 2018(1): 74-100
  8. Cihangir Tezcan and Ali Aydın Selçuk. Improved Improbable Differential Attacks on CLEFIA: Expansion Technique Revisited. Information Processing Letters 116(2), 136-143, (2016)

Book Chapters

  1. Aslı Basak Civek, and Cihangir Tezcan. Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. In Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022 (pp. 202–209) 
  2. Cihangir Tezcan. Cryptographic Foundations of Blockchain Technology. In: Blockchain. Chapman and Hall/CRC, 2022. p. 221-241.
  3. Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, and Friedrich Wiemer. Weak-Key Distinguishers for AES. In Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 141–170). Springer (2020)
  4. Cihangir Tezcan, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, Nazife Baykal. Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited. In book: Lightsec 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol. 10098, 18-32, Springer (2017)

Conference Papers

  1. Cihangir Tezcan, and Gregor Leander. GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA. IACR Trans. Symmetric Cryptol., 2025(1), p.309–327.
  2. Cihangir Tezcan. GPU-Based Brute Force Cryptanalysis of KLEIN. In Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024 (pp. 884–889). SCITEPRESS.
  3. Aslı Basak Civek, and Cihangir Tezcan. Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON. In Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers (pp. 91–103). Springer.
  4. Cihangir Tezcan. Brute Force Cryptanalysis of Mifare Classic Cards on GPU. Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 524-528, Porto, Portugal, ICISSP (2017)
  5. Cihangir Tezcan, Ali Doğanaksoy, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, Nazife Baykal. On Differential Factors. Iscturkey 2016, Proceedings of IX. International conference on Information Security and Cryptology, 103-110 (2016)
  6. Cihangir Tezcan. Truncated, Impossible, and Improbable Differential Analysis of Ascon. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 325-332, Rome, Italy, ICISSP (2016)

Last Updated:
14/04/2025 - 05:31