Geri Dön

Provable security of block ciphers and cryptanalysis

Başlık çevirisi mevcut değil.

  1. Tez No: 401600
  2. Yazar: ASLI BAY
  3. Danışmanlar: PROF. SERGE VAUDENAY
  4. Tez Türü: Doktora
  5. Konular: Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol, Computer Engineering and Computer Science and Control
  6. Anahtar Kelimeler: Symmetric cryptography, block ciphers, Decorrelation Theory, statistical attacks, iterated attacks, linear attacks, boomerang attacks, differential-linear attacks, related-key attacks, multidimensional linear attacks, MIBS, Triple-DES
  7. Yıl: 2014
  8. Dil: İngilizce
  9. Üniversite: Ecole Polytechnique Fédérale de Lausanne (EPFL)
  10. Enstitü: Yurtdışı Enstitü
  11. Ana Bilim Dalı: Belirtilmemiş.
  12. Bilim Dalı: Belirtilmemiş.
  13. Sayfa Sayısı: 136

Özet

Özet yok.

Özet (Çeviri)

Symmetric-key primitives, especially block ciphers, constitute a major building block in many cryptographic applications. In contrast with asymmetric-key primitives whose security is often provably reduced to some hard mathematical problems, the security of symmetrickey primitives is often based on the empirical non-existence of successful attacks. Hence, cryptanalytic results are fundamental for evaluating their security. However, by only evaluating the security against well-known attacks, there is no guaranty against yet-to-be-discovered attacks. It would be preferable to seek for provable security. This is a goal of Decorrelation Theory, put forward by Vaudenay. This theory provides useful tools to design provable secure block ciphers against a big set of statistical attacks. The contribution of this dissertation is two-fold: we study provable security of block ciphers with a focus on Decorrelation Theory, and we evaluate the security of two block ciphers against statistical attacks. Firstly, we focus on Decorrelation Theory. We study iterated distinguishers which comprise iterating adversaries who can make d plaintext queries, keep one bit information for each query, and they try to distinguish a random cipher C from the perfect cipher C¤ based on the collected bits. We revisit a previous result about non-adaptive iterated attacks of order d which was showing some sufficient conditions for a cipher to resist to these attacks. We show that these conditions are somehow necessary, which was an open question since 1999. Furthermore, we extend the applicability of these results to a bigger set of iterated attacks, i.e., adaptive iterated attacks. In addition to these results, we concentrate on proving the security of block ciphers against both boomerang and differential-linear attacks using the tools provided by Decorrelation Theory. Secondly,we provide cryptanalysis of two block ciphers; namely, Triple-DES and the lightweight block cipher MIBS. For Triple-DES, based on finding fixed points, a related-key attack against two-key and three-key triple encryptions is proposed. For the attack on two-key triple encryption, it has exactly the same performance as the meet-in-the-middle attack on double encryption and comparable to theMerkle-Hellman attack (except related keys). In addition, the attack on three-key triple encryption has a higher complexity than the Kelsey-Schneier- Wagner attack; nevertheless, it has the advantage that it is feasible with known plaintexts. Our final contribution is a cryptanalyzing ofMIBS by finding out its vulnerability against linear cryptanalysis together with using several linear approximations at the same time. We show that 19 rounds out of 32 rounds of MIBS are theoretically broken by the multidimensional linear attack.

Benzer Tezler

  1. Dizi şifreleme sistemleri ve doğrusal karmaşıklık

    Başlık çevirisi yok

    ERKAY SAVAŞ

    Yüksek Lisans

    Türkçe

    Türkçe

    1994

    Elektrik ve Elektronik Mühendisliğiİstanbul Teknik Üniversitesi

    PROF.DR. İ. CEM GÖKNAR

  2. Çok boyutlu kaotik sistemler ile şifreleme

    Encryption with multi-dimensional chaotic systems

    ASİYE YİĞİT

    Yüksek Lisans

    Türkçe

    Türkçe

    1997

    Elektrik ve Elektronik Mühendisliğiİstanbul Teknik Üniversitesi

    Elektronik ve Haberleşme Mühendisliği Ana Bilim Dalı

    DOÇ. DR. CÜNEYT GÜZELİŞ

  3. Boole fonksiyonları ve S-kutularının kriptografik özelliklerinin incelenmesi ve ters haritalama tabanlı cebirsel açıdan güçlendirilmiş bir S-kutusu önerisi

    Examinig cryptographic criteria for boolean functions and S-boxes and algebraically improved an S-box propose based on inversion mapping

    BORA ASLAN

    Yüksek Lisans

    Türkçe

    Türkçe

    2008

    Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve KontrolTrakya Üniversitesi

    Bilgisayar Mühendisliği Bölümü

    YRD. DOÇ. DR. M. TOLGA SAKALLI

  4. Kriptografik Hash fonksiyonları ve uygulamaları

    Cryptographic Hash functions and its applications

    SENİYE SOYALIÇ

    Yüksek Lisans

    Türkçe

    Türkçe

    2005

    MatematikErciyes Üniversitesi

    Matematik Ana Bilim Dalı

    PROF.DR. HÜSEYİN ALTINDİŞ

  5. A survey on the provable security using indistinguishability notion on cryptographic encryption schemes

    Şifreleme algoritmalarında ayırdedilemezlik kavramı kullanılarak güvenlik tanımı

    EMRE AYAR

    Yüksek Lisans

    İngilizce

    İngilizce

    2018

    MatematikOrta Doğu Teknik Üniversitesi

    Kriptografi Ana Bilim Dalı

    DOÇ. DR. ALİ DOĞANAKSOY

    DR. ONUR KOÇAK