Analysis and design of symmetric cryptographic algorithms:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2015
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | xi, 196 Seiten Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043022095 | ||
003 | DE-604 | ||
005 | 20151123 | ||
007 | t | ||
008 | 151119s2015 |||| m||| 00||| eng d | ||
035 | |a (OCoLC)931689009 | ||
035 | |a (DE-599)BVBBV043022095 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Jovanovic, Philipp |e Verfasser |4 aut | |
245 | 1 | 0 | |a Analysis and design of symmetric cryptographic algorithms |c Philipp Jovanovic |
264 | 1 | |c 2015 | |
300 | |a xi, 196 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Passau |d 2015 | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus4-3319 |
856 | 4 | 1 | |u https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/331 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-3319 |x Resolving-System |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028446877&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028446877 |
Datensatz im Suchindex
_version_ | 1804175372937330688 |
---|---|
adam_text | Contents
Acknowledgements
Motivation
List of Symbols
1 Introduction
1.1 Cryptography..........................................
1.1.1 Block Ciphers..................................
1.1.2 Stream Ciphers.................................
1.1.3 Hash Functions.................................
1.1.4 Message Authentication Codes...................
1.1.5 Authenticated Encryption Schemes...............
1.2 Cryptanalysis.........................................
1.2.1 Brute-Force Attacks............................
1.2.2 Differential Attacks...........................
1.2.3 Linear Attacks.................................
1.2.4 Algebraic Attacks..............................
1.2.5 Rotational Attacks.............................
1.2.6 Implementation Attacks.........................
1.3 Security Notions......................................
2 Fault-based Attacks on the Block Ciphers LED and PRINCE
2.1 Introduction..........................................
2.2 The Block Cipher LED..................................
2.2.1 General Layout.................................
2.2.2 Round Function ................................
2.3 The Block Cipher PRINCE...............................
2.3.1 General Layout.................................
2.3.2 Round Function ................................
2.4 Fault Attacks on LED-64 ..............................
2.4.1 Fault Models...................................
2.4.2 Fault Equations................................
vii
xi
1
1
2
6
7
8
8
17
20
23
30
32
35
35
40
43
43
44
44
46
48
48
48
50
50
51
m
Contents
2.4.3 Key Filtering Mechanisms....................................... 54
2.4.4 Experimental Results .......................................... 60
2.4.5 Extensions of the Fault Attack................................. 61
2.5 Multi-Stage Fault Attacks on LED-128 and PRINCE....................... 64
2.5.1 The Multi-Stage Fault Attack Framework......................... 64
2.5.2 Applications to LED-128........................................ 66
2.5.3 Experimental Results .......................................... 68
2.5.4 Applications to PRINCE ........................................ 69
2.5.5 Experimental Results .......................................... 72
2.5.6 Extensions of the Fault Attacks................................ 73
2.6 Algebraic Fault Attacks on LED-64..................................... 74
2.6.1 Algebraic Representation of LED................................ 74
2.6.2 Algebraic Representation of the LED Fault Equations............ 79
2.6.3 Experimental Results .......................................... 79
2.7 Conclusion............................................................ 80
3 Fault-based Attacks on the Bel֊T Block Cipher Family 83
3.1 Introduction.......................................................... 83
3.2 The Block Cipher Bel-T................................................ 84
3.3 Fault Attacks on Bel-T................................................ 85
3.3.1 Bel-T-128...................................................... 87
3.3.2 Bel-T-192...................................................... 89
3.3.3 Bel-T-256 ..................................................... 90
3.3.4 Experimental Results .......................................... 90
3.4 Practical Issues and Countermeasures ................................. 91
3.5 Conclusion............................................................ 92
4 NORX: Parallel and Scalable Authenticated Encryption 95
4.1 Introduction.......................................................... 95
4.2 Specification......................................................... 99
4.2.1 Preliminaries.................................................. 99
4.2.2 Parameters and Interface ......................................100
4.2.3 Layout Overview................................................101
4.2.4 The Round Function.............................................102
4.2.5 Encryption Mode................................................103
4.2.6 Decryption Mode................................................Ill
4.2.7 Datagrams .....................................................113
4.3 Security Goals.......................................................114
4.4 Features..............................................................119
4.4.1 List of Characteristics........................................119
4.4.2 Recommended Parameter Sets ....................................121
IV
Contents
4.4.3 Performance..........................
4.5 Design Rationale............................
4.5.1 The Parallel MonkeyDuplex Construction
4.5.2 The Functions F, G, and H ............
4.5.3 Selection of Constants................
4.5.4 Number of Rounds......................
4.5.5 The Padding Rule......................
4.6 Conclusion..................................
121
130
130
131
133
135
137
137
5
Analysis of NORX
5.1 Introduction.....................................
5.2 General Observations on G and F..................
5.2.1 Fix Points................................
5.2.2 Weak States...............................
5.2.3 Algebraic Properties......................
5.2.4 Slide Attacks.............................
5.3 Differential Cryptanalysis.......................
5.3.1 Simple Differentials......................
5.3.2 Impossible Differentials .................
5.3.3 NODE ֊ NORX Differential Search Engine
5.4 Rotational Cryptanalysis.........................
5.5 Conclusion.......................................
139
139
139
139
140
141
142
142
143
147
149
163
165
Bibliography
167
Test Vectors for NORX
187
Publications
195
|
any_adam_object | 1 |
author | Jovanovic, Philipp |
author_facet | Jovanovic, Philipp |
author_role | aut |
author_sort | Jovanovic, Philipp |
author_variant | p j pj |
building | Verbundindex |
bvnumber | BV043022095 |
classification_rvk | ST 276 |
collection | ebook |
ctrlnum | (OCoLC)931689009 (DE-599)BVBBV043022095 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01712nam a2200409 c 4500</leader><controlfield tag="001">BV043022095</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151123 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">151119s2015 |||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)931689009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043022095</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jovanovic, Philipp</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analysis and design of symmetric cryptographic algorithms</subfield><subfield code="c">Philipp Jovanovic</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xi, 196 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Passau</subfield><subfield code="d">2015</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus4-3319</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/331</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-3319</subfield><subfield code="x">Resolving-System</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028446877&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028446877</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV043022095 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:15Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028446877 |
oclc_num | 931689009 |
open_access_boolean | 1 |
owner | DE-739 |
owner_facet | DE-739 |
physical | xi, 196 Seiten Diagramme |
psigel | ebook |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
record_format | marc |
spelling | Jovanovic, Philipp Verfasser aut Analysis and design of symmetric cryptographic algorithms Philipp Jovanovic 2015 xi, 196 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Passau 2015 Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-3319 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/331 Verlag kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-3319 Resolving-System Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028446877&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Jovanovic, Philipp Analysis and design of symmetric cryptographic algorithms Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4113937-9 |
title | Analysis and design of symmetric cryptographic algorithms |
title_auth | Analysis and design of symmetric cryptographic algorithms |
title_exact_search | Analysis and design of symmetric cryptographic algorithms |
title_full | Analysis and design of symmetric cryptographic algorithms Philipp Jovanovic |
title_fullStr | Analysis and design of symmetric cryptographic algorithms Philipp Jovanovic |
title_full_unstemmed | Analysis and design of symmetric cryptographic algorithms Philipp Jovanovic |
title_short | Analysis and design of symmetric cryptographic algorithms |
title_sort | analysis and design of symmetric cryptographic algorithms |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit Kryptologie Hochschulschrift |
url | https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/331 https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-3319 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028446877&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jovanovicphilipp analysisanddesignofsymmetriccryptographicalgorithms |