Recent Methods for Cryptanalysis of Symmetric-key Cryptographic Algorithms (Recente Methoden voor de Cryptanalyse van Symmetrische-sleutel Cryptografische Algoritmen)
نویسنده
چکیده
Cryptography is the art and science of secret communication. In the past it has been exclusively the occupation of the military. It is only during the last forty years that the study and practice of cryptography has reached the wide public. Nowadays, cryptography is not only actively studied in leading universities as part of their regular curriculum, but it is also widely used in our everyday lives. It protects our GSM communications and on-line financial transactions, our electronic health records and personal data. Internet services for which security is critical, such as online banking, electronic commerce, e-voting and the whole concept of the e-Government are utterly unimaginable without the necessary cryptographic mechanisms. In order for cryptography to serve its purposes well, secure and reliable cryptographic algorithms are necessary. The design of such algorithms is intimately linked to the ability to analyze and understand their properties. The latter are the subject of study of cryptanalysis. A cryptanalytic technique to a cryptographer is what the hammer and the anvil are to the blacksmith. With better tools higher art is accomplished. The goal of this thesis is to study new techniques for cryptanalysis of symmetric-key cryptographic algorithms. The first part of the thesis focuses on methods for cryptanalysis of ARX algorithms. These are algorithms based on the operations modular addition, bit rotation and XOR, collectively denoted as ARX. Many contemporary algorithms fall into this class. For example, the block ciphers TEA, XTEA and RC5, the stream cipher Salsa20, the hash functions MD4, MD5, SHA-1 and SHA-2 as well as two of the candidate proposals for the next generation cryptographic hash function standard SHA-3: the hash functions BLAKE and Skein. In this thesis we propose a general framework for the differential analysis of ARX algorithms. This framework is used to compute the probabilities with which differences propagate through the ARX operations. The accurate computation of these probabilities is critical for estimating the success of one
منابع مشابه
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملSAT-based cryptanalysis of ACORN
The CAESAR competition aims to provide a portfolio of authenticated encryption algorithms. SAT solvers represent powerful tools to verify automatically and efficiently (among others) the confidentiality and the authenticity of information claimed by cryptographic primitives. In this work, we study the security of the CAESAR candidate Acorn against a SAT-based cryptanalysis. We provide the first...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملSome Results in Group-Based Cryptography
Group-based cryptography is concerned with the role of nonabelian groups in cryptography. Since its origins in the 1980s, there have been numerous cryptographic proposals based on nonabelian groups, many of which have been broken. This thesis adds to the cryptanalytic literature by demonstrating the insecurity of several group-based cryptosystems. We cryptanalyse several key establishment proto...
متن کاملKangaroos in Side-Channel Attacks
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithmbased systems significantly more unknown bits can be handled by using Pollard’s kangaroo method: if b bits are unknown then ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012