Browse By Repository:

 
 
 
   

Improved Techniques For Cryptanalysis Of Lightweight Block Ciphers Using Statistical, Algebraic And Side-Channel Methods

Abdul Latip, Shekh Faisal and Abu, Nor Azman and Ahmad, Rabiah and Hussin, Burairah and Z'aba, Muhammad Reza and Zainal Abidin, Zaheera (2019) Improved Techniques For Cryptanalysis Of Lightweight Block Ciphers Using Statistical, Algebraic And Side-Channel Methods. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] Text
Improved Techniques For Cryptanalysis Of Lightweight Block Ciphers Using Statistical, Algebraic And Side-Channel Methods.pdf - Submitted Version
Restricted to Registered users only

Download (292kB)

Abstract

The uses of block cipher has become crucial in nowadays’ computing era as well as the information security. Information must be available only for authenticated and authorized users. However, flaws and weaknesses in the cryptosystem can breach the security of stored and transmitted information. A weak key in the key schedule is well-known issues which may affect several round keys have same bits in common. Besides, information leaked from the implementation also affects the security of block ciphers. Based on the flaws and leakage, the adversary is able to assess the differential relationships in block cipher using differential cryptanalysis technique. Firstly, the existing differential cryptanalysis techniques have been evaluated. Secondly, based on the gaps that have to be filled in the existing differential cryptanalysis techniques, new frameworks of differential cryptanalysis techniques have been proposed and designed by using Pearson correlation coefficient, Hamming-weight leakage assumption and reference point. The Pearson correlation coefficient is used to determine the repeated differential properties in the key schedules. Meanwhile, reference point and Hamming-weight leakage assumption are used to assess the security of the implementation of block ciphers against side-channel cube attack and differential fault analysis. Thirdly, all proposed frameworks have been assessed. The results show that the repeated differential properties are found for AES, PRESENT and Simeck key schedules. However, AES key schedule is definitely ideal to be adopted in the design for the future cryptographic algorithm. In addition, the newly designed frameworks for side-channel differential analysis techniques have been able to reduce the attack complexities for Simeck32/64, KATAN32 and KTANTAN32 compared to previous work. In conclusion, the proposed frameworks are effective in analyzing the security of block ciphers using differential cryptanalysis techniques.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Cryptography, Computer algorithms, Computer security, Data encryption (Computer science)
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Long/ Short Term Research > FTMK
Depositing User: Mohd Hannif Jamaludin
Date Deposited: 31 Dec 2019 02:58
Last Modified: 31 Dec 2019 02:58
URI: http://digitalcollection.utem.edu.my/id/eprint/24135

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year