Cryptanalysis of symmetric-key primitives and its application to backdoor design
This thesis focuses on the cryptanalysis of symmetric-key cryptography, one of the most important branches of modern cryptography. The research spans two aspects of cryptanalysis. Studying cryptanalysis provides better evaluation on the security of symmetric-key primitives. At first, we develop a ne...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Doctor of Philosophy |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/146046 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-146046 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1460462023-02-28T23:56:35Z Cryptanalysis of symmetric-key primitives and its application to backdoor design Wang, Haoyang Thomas Peyrin School of Physical and Mathematical Sciences thomas.peyrin@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography This thesis focuses on the cryptanalysis of symmetric-key cryptography, one of the most important branches of modern cryptography. The research spans two aspects of cryptanalysis. Studying cryptanalysis provides better evaluation on the security of symmetric-key primitives. At first, we develop a new tool of boomerang attack and apply it to the analysis of the block cipher AES and the tweakable block cipher Deoxys-BC. We then introduce the technique of structure to key materials for the first time, with the help of which the currently best related key attack on full-round AES-256 can be improved. Lastly, we improve the meet-in-the-middle preimage attacks on AES hashing modes. Aside from providing security evaluation, cryptanalysis can also be used intentionally to create weakness in a cipher, so-called backdoor. We propose the MALICIOUS framework, a new method to build tweakable block ciphers that have backdoors hidden, based on differential cryptanalysis. A concrete instantiation of this framework named LowMC-M is then proposed. Doctor of Philosophy 2021-01-22T01:57:29Z 2021-01-22T01:57:29Z 2021 Thesis-Doctor of Philosophy Wang, H. (2021). Cryptanalysis of symmetric-key primitives and its application to backdoor design. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/146046 10.32657/10356/146046 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics::Discrete mathematics::Cryptography |
spellingShingle |
Science::Mathematics::Discrete mathematics::Cryptography Wang, Haoyang Cryptanalysis of symmetric-key primitives and its application to backdoor design |
description |
This thesis focuses on the cryptanalysis of symmetric-key cryptography, one of the most important branches of modern cryptography. The research spans two aspects of cryptanalysis. Studying cryptanalysis provides better evaluation on the security of symmetric-key primitives. At first, we develop a new tool of boomerang attack and apply it to the analysis of the block cipher AES and the tweakable block cipher Deoxys-BC. We then introduce the technique of structure to key materials for the first time, with the help of which the currently best related key
attack on full-round AES-256 can be improved. Lastly, we improve the meet-in-the-middle preimage attacks on AES hashing modes. Aside from providing security evaluation, cryptanalysis can also be used intentionally to create weakness in a cipher, so-called backdoor. We propose the MALICIOUS framework, a new method to build tweakable block ciphers that have backdoors hidden, based on differential cryptanalysis. A concrete instantiation of this framework named LowMC-M is then proposed. |
author2 |
Thomas Peyrin |
author_facet |
Thomas Peyrin Wang, Haoyang |
format |
Thesis-Doctor of Philosophy |
author |
Wang, Haoyang |
author_sort |
Wang, Haoyang |
title |
Cryptanalysis of symmetric-key primitives and its application to backdoor design |
title_short |
Cryptanalysis of symmetric-key primitives and its application to backdoor design |
title_full |
Cryptanalysis of symmetric-key primitives and its application to backdoor design |
title_fullStr |
Cryptanalysis of symmetric-key primitives and its application to backdoor design |
title_full_unstemmed |
Cryptanalysis of symmetric-key primitives and its application to backdoor design |
title_sort |
cryptanalysis of symmetric-key primitives and its application to backdoor design |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/146046 |
_version_ |
1759857624908562432 |