Cryptanalysis of lightweight symmetric-key cryptographic algorithms

Lightweight symmetric-key cryptography has gained significant traction in the recent years due to the rapid proliferation of resource-constrained devices and the increase in demand for secure communication and data protection in multiple domains. In response to the growing need, NIST, the Nationa...

Full description

Saved in:
Bibliographic Details
Main Author: Tan, Quan Quan
Other Authors: Thomas Peyrin
Format: Thesis-Doctor of Philosophy
Language:English
Published: Nanyang Technological University 2024
Subjects:
Online Access:https://hdl.handle.net/10356/173124
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-173124
record_format dspace
spelling sg-ntu-dr.10356-1731242024-02-01T09:53:44Z Cryptanalysis of lightweight symmetric-key cryptographic algorithms Tan, Quan Quan Thomas Peyrin School of Physical and Mathematical Sciences thomas.peyrin@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography Lightweight symmetric-key cryptography has gained significant traction in the recent years due to the rapid proliferation of resource-constrained devices and the increase in demand for secure communication and data protection in multiple domains. In response to the growing need, NIST, the National Institute of Standards and Technology, has issued a call to standardize lightweight cryptographic algorithms. The aim is to search a secure algorithm with low implementation cost that is suitable for use in constrained environments. With that in mind, many cryptographers gravitate towards designs that push the boundaries of what is considered secure. Complementing with the fact that these designs may one day become the next standard to be used by the industry, a thorough security analysis of these algorithms has to be conducted. In this thesis, we focus on the cryptanalysis of lightweight symmetric-key ciphers. This thesis contains three content-based chapters. First, we look at how we can use constraint programming as an automated tool to search for differential characteristics. Using these differential characteristics, we construct differential-based distinguishers for round-reduced ASCON permutation, build forgeries for ASCON-128 authenticated encryption scheme, and form a collision attack on ASCON-HASH. Second, we turn to neural distinguishers; a new type of distinguisher that is based on deep neural networks was introduced at CRYPTO’19. We examine the inner workings of the neural distinguishers and give an explanation as to what the neural distinguishers are using to detect and distinguish real ciphertext pairs from a uniform distribution. We then construct conventional distinguishers (not based on deep neuralnetwork) that are on par with the neural distinguishers in terms of accuracy. Finally, we return to a basic assumption that most cryptanalysts use when constructing differential characteristics: the Markov cipher assumption. We question the validity of many differential characteristics in the literature and found that many differential characteristics for the GIFT and SKINNY family of ciphers are in fact invalid. We also developed a tool that can automatically analyze such incompatibilities in differential characteristics of GIFT and SKINNY ciphers. For SKINNY, our tool is even able to give an estimated probability distribution based on the constraints we have detected. Eventually, we gave suggestions as to how these constraints can be incorporated into automated tools to improve the correctness of differential characteristics produced. Doctor of Philosophy 2024-01-16T07:07:54Z 2024-01-16T07:07:54Z 2023 Thesis-Doctor of Philosophy Tan, Q. Q. (2023). Cryptanalysis of lightweight symmetric-key cryptographic algorithms. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/173124 https://hdl.handle.net/10356/173124 10.32657/10356/173124 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle Science::Mathematics::Discrete mathematics::Cryptography
Tan, Quan Quan
Cryptanalysis of lightweight symmetric-key cryptographic algorithms
description Lightweight symmetric-key cryptography has gained significant traction in the recent years due to the rapid proliferation of resource-constrained devices and the increase in demand for secure communication and data protection in multiple domains. In response to the growing need, NIST, the National Institute of Standards and Technology, has issued a call to standardize lightweight cryptographic algorithms. The aim is to search a secure algorithm with low implementation cost that is suitable for use in constrained environments. With that in mind, many cryptographers gravitate towards designs that push the boundaries of what is considered secure. Complementing with the fact that these designs may one day become the next standard to be used by the industry, a thorough security analysis of these algorithms has to be conducted. In this thesis, we focus on the cryptanalysis of lightweight symmetric-key ciphers. This thesis contains three content-based chapters. First, we look at how we can use constraint programming as an automated tool to search for differential characteristics. Using these differential characteristics, we construct differential-based distinguishers for round-reduced ASCON permutation, build forgeries for ASCON-128 authenticated encryption scheme, and form a collision attack on ASCON-HASH. Second, we turn to neural distinguishers; a new type of distinguisher that is based on deep neural networks was introduced at CRYPTO’19. We examine the inner workings of the neural distinguishers and give an explanation as to what the neural distinguishers are using to detect and distinguish real ciphertext pairs from a uniform distribution. We then construct conventional distinguishers (not based on deep neuralnetwork) that are on par with the neural distinguishers in terms of accuracy. Finally, we return to a basic assumption that most cryptanalysts use when constructing differential characteristics: the Markov cipher assumption. We question the validity of many differential characteristics in the literature and found that many differential characteristics for the GIFT and SKINNY family of ciphers are in fact invalid. We also developed a tool that can automatically analyze such incompatibilities in differential characteristics of GIFT and SKINNY ciphers. For SKINNY, our tool is even able to give an estimated probability distribution based on the constraints we have detected. Eventually, we gave suggestions as to how these constraints can be incorporated into automated tools to improve the correctness of differential characteristics produced.
author2 Thomas Peyrin
author_facet Thomas Peyrin
Tan, Quan Quan
format Thesis-Doctor of Philosophy
author Tan, Quan Quan
author_sort Tan, Quan Quan
title Cryptanalysis of lightweight symmetric-key cryptographic algorithms
title_short Cryptanalysis of lightweight symmetric-key cryptographic algorithms
title_full Cryptanalysis of lightweight symmetric-key cryptographic algorithms
title_fullStr Cryptanalysis of lightweight symmetric-key cryptographic algorithms
title_full_unstemmed Cryptanalysis of lightweight symmetric-key cryptographic algorithms
title_sort cryptanalysis of lightweight symmetric-key cryptographic algorithms
publisher Nanyang Technological University
publishDate 2024
url https://hdl.handle.net/10356/173124
_version_ 1789968689109401600