Analysis and design of authenticated ciphers

An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentiality, integrity and authenticity of the data. It is an integration of the existing symmetric key primitives such as block ciphers, stream ciphers and hash functions, and attracts a lot of research intere...

Full description

Saved in:
Bibliographic Details
Main Author: Huang, Tao
Other Authors: Xing Chaoping
Format: Theses and Dissertations
Language:English
Published: 2016
Subjects:
Online Access:https://hdl.handle.net/10356/65961
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-65961
record_format dspace
spelling sg-ntu-dr.10356-659612023-02-28T23:34:33Z Analysis and design of authenticated ciphers Huang, Tao Xing Chaoping Wu Hongjun School of Physical and Mathematical Sciences DRNTU::Science::Mathematics::Discrete mathematics::Cryptography An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentiality, integrity and authenticity of the data. It is an integration of the existing symmetric key primitives such as block ciphers, stream ciphers and hash functions, and attracts a lot of research interests in recent years, especially after the announcement of the CAESAR competition. In this thesis, we study the analysis and designs of the authenticated ciphers. We begin with an introduction to symmetric key cryptography and authenticated ciphers followed by discussing on the typical methods used in the cryptanalysis and design of authenticated ciphers. Then, several concrete case studies in analyzing the authenticated ciphers are presented. We apply differential-linear cryptanalysis to recover the internal state of ICEPOLE. Differential IV cryptanalysis is used to attack the initialization of the 128-EEA3/128-EIA3 stream cipher ZUC. By exploiting the leaked state from the keystreams, we present a forgery attack on ALE. By exploiting the parameter settings, we present distinguishing and forgery attacks against the authenticated encryption scheme COFFE. We provide a collision attack to break the authentication claim for the authenticated encryption mode IOC. For the design of authenticated ciphers, we propose two schemes, JAMBU and MORUS fulfilling various features. JAMBU is a lightweight authenticated encryption mode which provides an intermediate level of nonce misuse resistance. MORUS is a nonce-based authenticated cipher which is targeted for high performance in both software and hardware. DOCTOR OF PHILOSOPHY (SPMS) 2016-02-05T05:48:01Z 2016-02-05T05:48:01Z 2016 Thesis Huang, T. (2016). Analysis and design of authenticated ciphers. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/65961 10.32657/10356/65961 en 222 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
Huang, Tao
Analysis and design of authenticated ciphers
description An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentiality, integrity and authenticity of the data. It is an integration of the existing symmetric key primitives such as block ciphers, stream ciphers and hash functions, and attracts a lot of research interests in recent years, especially after the announcement of the CAESAR competition. In this thesis, we study the analysis and designs of the authenticated ciphers. We begin with an introduction to symmetric key cryptography and authenticated ciphers followed by discussing on the typical methods used in the cryptanalysis and design of authenticated ciphers. Then, several concrete case studies in analyzing the authenticated ciphers are presented. We apply differential-linear cryptanalysis to recover the internal state of ICEPOLE. Differential IV cryptanalysis is used to attack the initialization of the 128-EEA3/128-EIA3 stream cipher ZUC. By exploiting the leaked state from the keystreams, we present a forgery attack on ALE. By exploiting the parameter settings, we present distinguishing and forgery attacks against the authenticated encryption scheme COFFE. We provide a collision attack to break the authentication claim for the authenticated encryption mode IOC. For the design of authenticated ciphers, we propose two schemes, JAMBU and MORUS fulfilling various features. JAMBU is a lightweight authenticated encryption mode which provides an intermediate level of nonce misuse resistance. MORUS is a nonce-based authenticated cipher which is targeted for high performance in both software and hardware.
author2 Xing Chaoping
author_facet Xing Chaoping
Huang, Tao
format Theses and Dissertations
author Huang, Tao
author_sort Huang, Tao
title Analysis and design of authenticated ciphers
title_short Analysis and design of authenticated ciphers
title_full Analysis and design of authenticated ciphers
title_fullStr Analysis and design of authenticated ciphers
title_full_unstemmed Analysis and design of authenticated ciphers
title_sort analysis and design of authenticated ciphers
publishDate 2016
url https://hdl.handle.net/10356/65961
_version_ 1759853544904589312