Analysis of iterated block ciphers

A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high performance, it is often the workhorse for providing confidentiality - one of the primary goals of cryptography. Hence the security of a block cipher is of fundamental importance in the entire infras...

Full description

Saved in:
Bibliographic Details
Main Author: Wei, Lei
Other Authors: Ling San
Format: Theses and Dissertations
Language:English
Published: 2012
Subjects:
Online Access:https://hdl.handle.net/10356/49503
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-49503
record_format dspace
spelling sg-ntu-dr.10356-495032023-02-28T23:37:18Z Analysis of iterated block ciphers Wei, Lei Ling San Wang Huaxiong School of Physical and Mathematical Sciences DRNTU::Science::Mathematics::Discrete mathematics::Cryptography A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high performance, it is often the workhorse for providing confidentiality - one of the primary goals of cryptography. Hence the security of a block cipher is of fundamental importance in the entire infrastructure of cryptography, and therefore block ciphers shall be analyzed and evaluated. This practice is called block cipher cryptanalysis. In this thesis, we analyze a few block ciphers in the classic meet-in-the-middle model and in the recently proposed multidimensional linear cryptanalysis model. Besides for encryption, block ciphers are also one of the most versatile building blocks used for constructing many other cryptographic primitives. One such example is the compression function of cryptographic hash functions, and there is a close relation between the security analysis of block ciphers and hash functions. In addition, many dedicated cryptographic hash functions are designed with ideas used in block ciphers. Therefore, it is natural that many block cipher cryptanalysis techniques can be transferred to hash function analysis. In this thesis, we analyze hash functions with differential cryptanalysis and techniques inspired by differential cryptanalysis. On the other hand, recent advances in hash function cryptanalysis contribute to the analysis of block ciphers. We give one such example too. DOCTOR OF PHILOSOPHY (SPMS) 2012-05-21T04:07:03Z 2012-05-21T04:07:03Z 2012 2012 Thesis Wei, L. (2012). Analysis of iterated block ciphers. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/49503 10.32657/10356/49503 en 189 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
Wei, Lei
Analysis of iterated block ciphers
description A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high performance, it is often the workhorse for providing confidentiality - one of the primary goals of cryptography. Hence the security of a block cipher is of fundamental importance in the entire infrastructure of cryptography, and therefore block ciphers shall be analyzed and evaluated. This practice is called block cipher cryptanalysis. In this thesis, we analyze a few block ciphers in the classic meet-in-the-middle model and in the recently proposed multidimensional linear cryptanalysis model. Besides for encryption, block ciphers are also one of the most versatile building blocks used for constructing many other cryptographic primitives. One such example is the compression function of cryptographic hash functions, and there is a close relation between the security analysis of block ciphers and hash functions. In addition, many dedicated cryptographic hash functions are designed with ideas used in block ciphers. Therefore, it is natural that many block cipher cryptanalysis techniques can be transferred to hash function analysis. In this thesis, we analyze hash functions with differential cryptanalysis and techniques inspired by differential cryptanalysis. On the other hand, recent advances in hash function cryptanalysis contribute to the analysis of block ciphers. We give one such example too.
author2 Ling San
author_facet Ling San
Wei, Lei
format Theses and Dissertations
author Wei, Lei
author_sort Wei, Lei
title Analysis of iterated block ciphers
title_short Analysis of iterated block ciphers
title_full Analysis of iterated block ciphers
title_fullStr Analysis of iterated block ciphers
title_full_unstemmed Analysis of iterated block ciphers
title_sort analysis of iterated block ciphers
publishDate 2012
url https://hdl.handle.net/10356/49503
_version_ 1759854119741292544