Provable security of block ciphers and cryptanalysis
Başlık çevirisi mevcut değil.
- Tez No: 401600
- Danışmanlar: PROF. SERGE VAUDENAY
- Tez Türü: Doktora
- Konular: Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol, Computer Engineering and Computer Science and Control
- Anahtar Kelimeler: Symmetric cryptography, block ciphers, Decorrelation Theory, statistical attacks, iterated attacks, linear attacks, boomerang attacks, differential-linear attacks, related-key attacks, multidimensional linear attacks, MIBS, Triple-DES
- Yıl: 2014
- Dil: İngilizce
- Üniversite: Ecole Polytechnique Fédérale de Lausanne (EPFL)
- Enstitü: Yurtdışı Enstitü
- Ana Bilim Dalı: Belirtilmemiş.
- Bilim Dalı: Belirtilmemiş.
- Sayfa Sayısı: 136
Özet
Özet yok.
Özet (Çeviri)
Symmetric-key primitives, especially block ciphers, constitute a major building block in many cryptographic applications. In contrast with asymmetric-key primitives whose security is often provably reduced to some hard mathematical problems, the security of symmetrickey primitives is often based on the empirical non-existence of successful attacks. Hence, cryptanalytic results are fundamental for evaluating their security. However, by only evaluating the security against well-known attacks, there is no guaranty against yet-to-be-discovered attacks. It would be preferable to seek for provable security. This is a goal of Decorrelation Theory, put forward by Vaudenay. This theory provides useful tools to design provable secure block ciphers against a big set of statistical attacks. The contribution of this dissertation is two-fold: we study provable security of block ciphers with a focus on Decorrelation Theory, and we evaluate the security of two block ciphers against statistical attacks. Firstly, we focus on Decorrelation Theory. We study iterated distinguishers which comprise iterating adversaries who can make d plaintext queries, keep one bit information for each query, and they try to distinguish a random cipher C from the perfect cipher C¤ based on the collected bits. We revisit a previous result about non-adaptive iterated attacks of order d which was showing some sufficient conditions for a cipher to resist to these attacks. We show that these conditions are somehow necessary, which was an open question since 1999. Furthermore, we extend the applicability of these results to a bigger set of iterated attacks, i.e., adaptive iterated attacks. In addition to these results, we concentrate on proving the security of block ciphers against both boomerang and differential-linear attacks using the tools provided by Decorrelation Theory. Secondly,we provide cryptanalysis of two block ciphers; namely, Triple-DES and the lightweight block cipher MIBS. For Triple-DES, based on finding fixed points, a related-key attack against two-key and three-key triple encryptions is proposed. For the attack on two-key triple encryption, it has exactly the same performance as the meet-in-the-middle attack on double encryption and comparable to theMerkle-Hellman attack (except related keys). In addition, the attack on three-key triple encryption has a higher complexity than the Kelsey-Schneier- Wagner attack; nevertheless, it has the advantage that it is feasible with known plaintexts. Our final contribution is a cryptanalyzing ofMIBS by finding out its vulnerability against linear cryptanalysis together with using several linear approximations at the same time. We show that 19 rounds out of 32 rounds of MIBS are theoretically broken by the multidimensional linear attack.
Benzer Tezler
- Dizi şifreleme sistemleri ve doğrusal karmaşıklık
Başlık çevirisi yok
ERKAY SAVAŞ
Yüksek Lisans
Türkçe
1994
Elektrik ve Elektronik Mühendisliğiİstanbul Teknik ÜniversitesiPROF.DR. İ. CEM GÖKNAR
- Çok boyutlu kaotik sistemler ile şifreleme
Encryption with multi-dimensional chaotic systems
ASİYE YİĞİT
Yüksek Lisans
Türkçe
1997
Elektrik ve Elektronik Mühendisliğiİstanbul Teknik ÜniversitesiElektronik ve Haberleşme Mühendisliği Ana Bilim Dalı
DOÇ. DR. CÜNEYT GÜZELİŞ
- Boole fonksiyonları ve S-kutularının kriptografik özelliklerinin incelenmesi ve ters haritalama tabanlı cebirsel açıdan güçlendirilmiş bir S-kutusu önerisi
Examinig cryptographic criteria for boolean functions and S-boxes and algebraically improved an S-box propose based on inversion mapping
BORA ASLAN
Yüksek Lisans
Türkçe
2008
Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve KontrolTrakya ÜniversitesiBilgisayar Mühendisliği Bölümü
YRD. DOÇ. DR. M. TOLGA SAKALLI
- Kriptografik Hash fonksiyonları ve uygulamaları
Cryptographic Hash functions and its applications
SENİYE SOYALIÇ
Yüksek Lisans
Türkçe
2005
MatematikErciyes ÜniversitesiMatematik Ana Bilim Dalı
PROF.DR. HÜSEYİN ALTINDİŞ
- A survey on the provable security using indistinguishability notion on cryptographic encryption schemes
Şifreleme algoritmalarında ayırdedilemezlik kavramı kullanılarak güvenlik tanımı
EMRE AYAR
Yüksek Lisans
İngilizce
2018
MatematikOrta Doğu Teknik ÜniversitesiKriptografi Ana Bilim Dalı
DOÇ. DR. ALİ DOĞANAKSOY
DR. ONUR KOÇAK