MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS

The number of data breaches has increased significantly in recent times. Numerous cases have highlighted the importance of storing sensitive data in an encrypted state. Encryption can be implemented using block ciphers. Traditionally, block ciphers were designed to operate in environments with no...

Full description

Saved in:
Bibliographic Details
Main Author: Yuda Paripurna, Dian
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/84845
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:84845
spelling id-itb.:848452024-08-18T23:46:51ZMODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS Yuda Paripurna, Dian Indonesia Theses differential cryptanalysis, modification, block cipher. INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/84845 The number of data breaches has increased significantly in recent times. Numerous cases have highlighted the importance of storing sensitive data in an encrypted state. Encryption can be implemented using block ciphers. Traditionally, block ciphers were designed to operate in environments with no limitation on computational resources, but the focus has now shifted towards lightweight block ciphers (LWBC). LWBCs are computationally more efficient as they process smaller data and key sizes compared to conventional block ciphers. Examples of LWBC algorithms include PRESENT, PUFFIN2, DoT, and ACT. In addition to providing a lightweight implementation, encryption algorithms must also ensure security. An LWBC is considered secure if it is proven to be resistant to cryptanalysis attacks. Although challenging and time-consuming, evaluating algorithms through cryptanalysis is a crucial step in assessing the security of an algorithm. An LWBC algorithm should at least demonstrate sufficient resistance against basic cryptanalysis methods, such as differential cryptanalysis (Chan et al., 2023). DoT is a lightweight block cipher with a 64-bit block size and a 128-bit key, claimed to be resistant to differential cryptanalysis with a probability of 2 ?70 (Patil dkk., 2019). However, in 2022, Kumar demonstrated that the maximum differential trail probability for DoT over 31 rounds is not 2 ?70 but 2 ?62 . Kumar (2022) subsequently proposed MDoT as a modification of DoT. Although this represents an improvement, the value still exceeds the security threshold of 2 ?128. Therefore, this research aims to further develop the DoT algorithm by replacing its permutation layer with a 64-bit permutation using PRESENT, PUFFIN, and ACT permutations. The research was conducted using the Design Science Research Methodology (DSRM), which includes designing a modified algorithm, analyzing the impact of algorithm components on differential cryptanalysis, reconstructing Kumar’s (2022) work as a validation step, and evaluating the security of the modified algorithm design against differential cryptanalysis. Based on the evaluation, the differential trail for 31 rounds in DoTPRE and DoTPUF was found to have a probability of 2 ?93 with a total of 31 active S-boxes. Meanwhile, the differential trail for 31 rounds in DoTACT had a probability of 2 ?133 with a total of 47 active S-boxes. Iterative patterns of one round were also found in the differential trails of DoTPRE and DoTPUF, while no such pattern was found in DoTACT. Based on these evaluation results, DoTACT provides the most significant v security improvement for DoT compared to the other two modifications. Therefore, DoTACT is recommended as a modification of the DoT algorithm that can enhance its security against differential cryptanalysis. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description The number of data breaches has increased significantly in recent times. Numerous cases have highlighted the importance of storing sensitive data in an encrypted state. Encryption can be implemented using block ciphers. Traditionally, block ciphers were designed to operate in environments with no limitation on computational resources, but the focus has now shifted towards lightweight block ciphers (LWBC). LWBCs are computationally more efficient as they process smaller data and key sizes compared to conventional block ciphers. Examples of LWBC algorithms include PRESENT, PUFFIN2, DoT, and ACT. In addition to providing a lightweight implementation, encryption algorithms must also ensure security. An LWBC is considered secure if it is proven to be resistant to cryptanalysis attacks. Although challenging and time-consuming, evaluating algorithms through cryptanalysis is a crucial step in assessing the security of an algorithm. An LWBC algorithm should at least demonstrate sufficient resistance against basic cryptanalysis methods, such as differential cryptanalysis (Chan et al., 2023). DoT is a lightweight block cipher with a 64-bit block size and a 128-bit key, claimed to be resistant to differential cryptanalysis with a probability of 2 ?70 (Patil dkk., 2019). However, in 2022, Kumar demonstrated that the maximum differential trail probability for DoT over 31 rounds is not 2 ?70 but 2 ?62 . Kumar (2022) subsequently proposed MDoT as a modification of DoT. Although this represents an improvement, the value still exceeds the security threshold of 2 ?128. Therefore, this research aims to further develop the DoT algorithm by replacing its permutation layer with a 64-bit permutation using PRESENT, PUFFIN, and ACT permutations. The research was conducted using the Design Science Research Methodology (DSRM), which includes designing a modified algorithm, analyzing the impact of algorithm components on differential cryptanalysis, reconstructing Kumar’s (2022) work as a validation step, and evaluating the security of the modified algorithm design against differential cryptanalysis. Based on the evaluation, the differential trail for 31 rounds in DoTPRE and DoTPUF was found to have a probability of 2 ?93 with a total of 31 active S-boxes. Meanwhile, the differential trail for 31 rounds in DoTACT had a probability of 2 ?133 with a total of 47 active S-boxes. Iterative patterns of one round were also found in the differential trails of DoTPRE and DoTPUF, while no such pattern was found in DoTACT. Based on these evaluation results, DoTACT provides the most significant v security improvement for DoT compared to the other two modifications. Therefore, DoTACT is recommended as a modification of the DoT algorithm that can enhance its security against differential cryptanalysis.
format Theses
author Yuda Paripurna, Dian
spellingShingle Yuda Paripurna, Dian
MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
author_facet Yuda Paripurna, Dian
author_sort Yuda Paripurna, Dian
title MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
title_short MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
title_full MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
title_fullStr MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
title_full_unstemmed MODIFICATION OF DOT ALGORITHM ON PERMUTATION PROCESS TO IMPROVE SECURITY AGAINST DIFFERENTIAL CRYPTANALYSIS
title_sort modification of dot algorithm on permutation process to improve security against differential cryptanalysis
url https://digilib.itb.ac.id/gdl/view/84845
_version_ 1822282948738547712