Classical and physical security of symmetric key cryptographic algorithms
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Att...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Doctor of Philosophy |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152003 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-152003 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1520032021-09-06T02:34:42Z Classical and physical security of symmetric key cryptographic algorithms Baksi, Anubhab Anupam Chattopadhyay School of Computer Science and Engineering Hardware & Embedded Systems Lab (HESL) anupam@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography Engineering::Computer science and engineering::Data::Data encryption Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack. We show new results in context of both the classical and physical attacks to advance the state-of-the-art. In classical attack, we first show an issue related to a common modelling using Mixed Integer Linear Programming (MILP). We provide a new MILP modelling that overcomes this issue and explore heuristic options to reduce the solution time taken by the MILP solver. Our analysis shows that the solution time can be improved nearly ten folds by using a proper heuristic. Second, we show how Machine Learning (ML) can be used as a generic tool in the analysis of the symmetric key ciphers. In the process, we demonstrate how the existing security notions (that do not use ML) underestimate the vulnerability of the ciphers. To the best of our knowledge, this is the first generic application of ML in this field. In physical attack, we start with new mathematical results related to the Differential Fault Attack (DFA) from the point-of-view of the cipher designer. Next, we make use of these results to propose a cipher named DeFault, which has an in-built resistance against DFA. While all other methods to thwart DFA rely on some form of duplication, DeFault has an inherent protection against DFA that does not use duplication and hence is the first-of-its-kind. Third, we analyse the so-called Infective Countermeasure that is used as a duplication based DFA countermeasure in more depth. We construct new schemes, show weakness of an existing scheme, and propose a simple patch to another scheme to fix its weakness, among other results. Lastly, we propose a low-cost countermeasure to a newly proposed fault model, named Statistical Ineffective Fault analysis (SIFA). In contrast to the existing SIFA countermeasures that rely on some form of triplication at its core, our countermeasure uses duplication and thus is the most cost effective. Doctor of Philosophy 2021-07-12T01:55:40Z 2021-07-12T01:55:40Z 2021 Thesis-Doctor of Philosophy Baksi, A. (2021). Classical and physical security of symmetric key cryptographic algorithms. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/152003 https://hdl.handle.net/10356/152003 10.32657/10356/152003 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics::Discrete mathematics::Cryptography Engineering::Computer science and engineering::Data::Data encryption |
spellingShingle |
Science::Mathematics::Discrete mathematics::Cryptography Engineering::Computer science and engineering::Data::Data encryption Baksi, Anubhab Classical and physical security of symmetric key cryptographic algorithms |
description |
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack. We show new results in context of both the classical and physical attacks to advance the state-of-the-art.
In classical attack, we first show an issue related to a common modelling using Mixed Integer Linear Programming (MILP). We provide a new MILP modelling that overcomes this issue and explore heuristic options to reduce the solution time taken by the MILP solver. Our analysis shows that the solution time can be improved nearly ten folds by using a proper heuristic. Second, we show how Machine Learning (ML) can be used as a generic tool in the analysis of the symmetric key ciphers. In the process, we demonstrate how the existing security notions (that do not use ML) underestimate the vulnerability of the ciphers. To the best of our knowledge, this is the first generic application of ML in this field.
In physical attack, we start with new mathematical results related to the Differential Fault Attack (DFA) from the point-of-view of the cipher designer. Next, we make use of these results to propose a cipher named DeFault, which has an in-built resistance against DFA. While all other methods to thwart DFA rely on some form of duplication, DeFault has an inherent protection against DFA that does not use duplication and hence is the first-of-its-kind. Third, we analyse the so-called Infective Countermeasure that is used as a duplication based DFA countermeasure in more depth. We construct new schemes, show weakness of an existing scheme, and propose a simple patch to another scheme to fix its weakness, among other results. Lastly, we propose a low-cost countermeasure to a newly proposed fault model, named Statistical Ineffective Fault analysis (SIFA). In contrast to the existing SIFA countermeasures that rely on some form of triplication at its core, our countermeasure uses duplication and thus is the most cost effective. |
author2 |
Anupam Chattopadhyay |
author_facet |
Anupam Chattopadhyay Baksi, Anubhab |
format |
Thesis-Doctor of Philosophy |
author |
Baksi, Anubhab |
author_sort |
Baksi, Anubhab |
title |
Classical and physical security of symmetric key cryptographic algorithms |
title_short |
Classical and physical security of symmetric key cryptographic algorithms |
title_full |
Classical and physical security of symmetric key cryptographic algorithms |
title_fullStr |
Classical and physical security of symmetric key cryptographic algorithms |
title_full_unstemmed |
Classical and physical security of symmetric key cryptographic algorithms |
title_sort |
classical and physical security of symmetric key cryptographic algorithms |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/152003 |
_version_ |
1710686924553846784 |