Post-quantum attacks against symmetric-key cryptography systems

Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic sys...

Full description

Saved in:
Bibliographic Details
Main Author: Pham, Thi Minh Phuong
Other Authors: Guo Jian
Format: Thesis-Doctor of Philosophy
Language:English
Published: Nanyang Technological University 2024
Subjects:
Online Access:https://hdl.handle.net/10356/174201
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-174201
record_format dspace
spelling sg-ntu-dr.10356-1742012024-04-09T03:58:58Z Post-quantum attacks against symmetric-key cryptography systems Pham, Thi Minh Phuong Guo Jian School of Physical and Mathematical Sciences guojian@ntu.edu.sg Computer and Information Science Quantum attack Symmetric-key Constraint programming Advanced encryption standard Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic systems, with the aim of uncovering their weaknesses and vulnerabilities using classical computers. However, the emergence of quantum computing introduces a need to revise these security levels, considering a completely new set of algorithms. The main objective of this thesis is to explore the security aspects of block ciphers and hash functions, considering both traditional and quantum computing environments. Through the utilization of automated tools and quantum techniques, various attacks, such as distinguishers and collision attacks, were employed to evaluate the security levels of these fundamental cryptographic components. Firstly, we introduced quantum multi-collision distinguishers that enabled us to target a higher number of rounds on AES-like primitives. These distinguishers were developed by using constraint programming tools to automatically identify the related-key or single-key di erentials used in the attacks. This approach led to the discovery of several novel distinguishers for round-reduced AES, Saturnin, and Rijndael, expanding our understanding of their vulnerabilities. Next, building upon the observation that multi-collision attacks can be trans- formed into collision attacks, we adapted our automated tools to facilitate collision attacks. By incorporating the rebound techniques and the degree of freedom from keys and states to our model, we achieved significant advancements in the number of attacked rounds, ranging from one to five, in various target systems such as AES-128, Saturnin hashing mode, Grøstl-512, and SKINNY-hash. Finally, we expanded our investigation by integrating the degree of freedom from the tweak into our model. This innovation allowed us to create a unified related-key di erential search, enabling us to uncover new chosen-key distinguishing attacks on full-round AES, Kiasu-BC, and Deoxys-BC. Doctor of Philosophy 2024-03-20T02:59:37Z 2024-03-20T02:59:37Z 2024 Thesis-Doctor of Philosophy Pham, T. M. P. (2024). Post-quantum attacks against symmetric-key cryptography systems. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/174201 https://hdl.handle.net/10356/174201 10.32657/10356/174201 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Computer and Information Science
Quantum attack
Symmetric-key
Constraint programming
Advanced encryption standard
spellingShingle Computer and Information Science
Quantum attack
Symmetric-key
Constraint programming
Advanced encryption standard
Pham, Thi Minh Phuong
Post-quantum attacks against symmetric-key cryptography systems
description Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic systems, with the aim of uncovering their weaknesses and vulnerabilities using classical computers. However, the emergence of quantum computing introduces a need to revise these security levels, considering a completely new set of algorithms. The main objective of this thesis is to explore the security aspects of block ciphers and hash functions, considering both traditional and quantum computing environments. Through the utilization of automated tools and quantum techniques, various attacks, such as distinguishers and collision attacks, were employed to evaluate the security levels of these fundamental cryptographic components. Firstly, we introduced quantum multi-collision distinguishers that enabled us to target a higher number of rounds on AES-like primitives. These distinguishers were developed by using constraint programming tools to automatically identify the related-key or single-key di erentials used in the attacks. This approach led to the discovery of several novel distinguishers for round-reduced AES, Saturnin, and Rijndael, expanding our understanding of their vulnerabilities. Next, building upon the observation that multi-collision attacks can be trans- formed into collision attacks, we adapted our automated tools to facilitate collision attacks. By incorporating the rebound techniques and the degree of freedom from keys and states to our model, we achieved significant advancements in the number of attacked rounds, ranging from one to five, in various target systems such as AES-128, Saturnin hashing mode, Grøstl-512, and SKINNY-hash. Finally, we expanded our investigation by integrating the degree of freedom from the tweak into our model. This innovation allowed us to create a unified related-key di erential search, enabling us to uncover new chosen-key distinguishing attacks on full-round AES, Kiasu-BC, and Deoxys-BC.
author2 Guo Jian
author_facet Guo Jian
Pham, Thi Minh Phuong
format Thesis-Doctor of Philosophy
author Pham, Thi Minh Phuong
author_sort Pham, Thi Minh Phuong
title Post-quantum attacks against symmetric-key cryptography systems
title_short Post-quantum attacks against symmetric-key cryptography systems
title_full Post-quantum attacks against symmetric-key cryptography systems
title_fullStr Post-quantum attacks against symmetric-key cryptography systems
title_full_unstemmed Post-quantum attacks against symmetric-key cryptography systems
title_sort post-quantum attacks against symmetric-key cryptography systems
publisher Nanyang Technological University
publishDate 2024
url https://hdl.handle.net/10356/174201
_version_ 1814047429841911808