Post-quantum attacks against symmetric-key cryptography systems
Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic sys...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Doctor of Philosophy |
Language: | English |
Published: |
Nanyang Technological University
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/174201 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-174201 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1742012024-04-09T03:58:58Z Post-quantum attacks against symmetric-key cryptography systems Pham, Thi Minh Phuong Guo Jian School of Physical and Mathematical Sciences guojian@ntu.edu.sg Computer and Information Science Quantum attack Symmetric-key Constraint programming Advanced encryption standard Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic systems, with the aim of uncovering their weaknesses and vulnerabilities using classical computers. However, the emergence of quantum computing introduces a need to revise these security levels, considering a completely new set of algorithms. The main objective of this thesis is to explore the security aspects of block ciphers and hash functions, considering both traditional and quantum computing environments. Through the utilization of automated tools and quantum techniques, various attacks, such as distinguishers and collision attacks, were employed to evaluate the security levels of these fundamental cryptographic components. Firstly, we introduced quantum multi-collision distinguishers that enabled us to target a higher number of rounds on AES-like primitives. These distinguishers were developed by using constraint programming tools to automatically identify the related-key or single-key di erentials used in the attacks. This approach led to the discovery of several novel distinguishers for round-reduced AES, Saturnin, and Rijndael, expanding our understanding of their vulnerabilities. Next, building upon the observation that multi-collision attacks can be trans- formed into collision attacks, we adapted our automated tools to facilitate collision attacks. By incorporating the rebound techniques and the degree of freedom from keys and states to our model, we achieved significant advancements in the number of attacked rounds, ranging from one to five, in various target systems such as AES-128, Saturnin hashing mode, Grøstl-512, and SKINNY-hash. Finally, we expanded our investigation by integrating the degree of freedom from the tweak into our model. This innovation allowed us to create a unified related-key di erential search, enabling us to uncover new chosen-key distinguishing attacks on full-round AES, Kiasu-BC, and Deoxys-BC. Doctor of Philosophy 2024-03-20T02:59:37Z 2024-03-20T02:59:37Z 2024 Thesis-Doctor of Philosophy Pham, T. M. P. (2024). Post-quantum attacks against symmetric-key cryptography systems. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/174201 https://hdl.handle.net/10356/174201 10.32657/10356/174201 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computer and Information Science Quantum attack Symmetric-key Constraint programming Advanced encryption standard |
spellingShingle |
Computer and Information Science Quantum attack Symmetric-key Constraint programming Advanced encryption standard Pham, Thi Minh Phuong Post-quantum attacks against symmetric-key cryptography systems |
description |
Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. The level of security of a cryptosystem is measured by the computational resources needed to break it. Traditional cryptanalysis focused on analyzing and breaking cryptographic systems, with the aim of uncovering their weaknesses and vulnerabilities using classical computers. However, the emergence of quantum computing introduces a need to revise these security levels, considering a completely new set of algorithms.
The main objective of this thesis is to explore the security aspects of block ciphers and hash functions, considering both traditional and quantum computing environments. Through the utilization of automated tools and quantum techniques, various attacks, such as distinguishers and collision attacks, were employed to evaluate the security levels of these fundamental cryptographic components.
Firstly, we introduced quantum multi-collision distinguishers that enabled us to target a higher number of rounds on AES-like primitives. These distinguishers were developed by using constraint programming tools to automatically identify the related-key or single-key di erentials used in the attacks. This approach led to the discovery of several novel distinguishers for round-reduced AES, Saturnin, and Rijndael, expanding our understanding of their vulnerabilities.
Next, building upon the observation that multi-collision attacks can be trans- formed into collision attacks, we adapted our automated tools to facilitate collision attacks. By incorporating the rebound techniques and the degree of freedom from keys and states to our model, we achieved significant advancements in the number of attacked rounds, ranging from one to five, in various target systems such as AES-128, Saturnin hashing mode, Grøstl-512, and SKINNY-hash.
Finally, we expanded our investigation by integrating the degree of freedom from the tweak into our model. This innovation allowed us to create a unified related-key di erential search, enabling us to uncover new chosen-key distinguishing attacks on full-round AES, Kiasu-BC, and Deoxys-BC. |
author2 |
Guo Jian |
author_facet |
Guo Jian Pham, Thi Minh Phuong |
format |
Thesis-Doctor of Philosophy |
author |
Pham, Thi Minh Phuong |
author_sort |
Pham, Thi Minh Phuong |
title |
Post-quantum attacks against symmetric-key cryptography systems |
title_short |
Post-quantum attacks against symmetric-key cryptography systems |
title_full |
Post-quantum attacks against symmetric-key cryptography systems |
title_fullStr |
Post-quantum attacks against symmetric-key cryptography systems |
title_full_unstemmed |
Post-quantum attacks against symmetric-key cryptography systems |
title_sort |
post-quantum attacks against symmetric-key cryptography systems |
publisher |
Nanyang Technological University |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/174201 |
_version_ |
1814047429841911808 |