Design, analysis, and implementation of symmetric-key (authenticated) ciphers:
Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank transactions or exchanging sensitive information. Tho...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Weimar
2021
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank transactions or exchanging sensitive information. Those high-level protocols can naturally be only as secure as the authentication or encryption schemes underneath. Moreover, on a more detailed level, those schemes can also at best inherit the security of their underlying primitives. While widespread standards in modern symmetric-key cryptography, such as the Advanced Encryption Standard (AES), have shown to resist analysis until now, closer analysis and design of related primitives can deepen our understanding. The present thesis consists of two parts that portray six contributions: The first part considers block-cipher cryptanalysis of the round-reduced AES, the AES-based tweakable block cipher Kiasu-BC, and TNT. The second part studies the design, analysis, and implementation of provably secure authenticated encryption schemes. In general, cryptanalysis aims at finding distinguishable properties in the output distribution. Block ciphers are a core primitive of symmetric-key cryptography which are useful for the construction of various higher-level schemes, ranging from authentication, encryption, authenticated encryption up to integrity protection. Therefore, their analysis is crucial to secure cryptographic schemes at their lowest level. With rare exceptions, block-cipher cryptanalysis employs a systematic strategy of investigating known attack techniques. Modern proposals are expected to be evaluated against these techniques. The considerable effort for evaluation, however, demands efforts not only from the designers but also from external sources. The Advanced Encryption Standard (AES) is one of the most widespread block ciphers nowadays. Therefore, it is naturally an interesting target for further analysis. Tweakable block ciphers augment the usual inputs of a secret key and a public plaintext by an additional public input called tweak. Among various proposals through the previous decade, this thesis identifies Kiasu-BC as a noteworthy attempt to construct a tweakable block cipher that is very close to the AES. Hence, its analysis intertwines closely with that of the AES and illustrates the impact of the tweak on its security best. Moreover, it revisits a generic tweakable block cipher Tweak-and-Tweak (TNT) and its instantiation based on the round-reduced AES. The first part investigates the security of the AES against several forms of differential cryptanalysis, developing distinguishers on four to six (out of ten) rounds of AES. For Kiasu-BC, it exploits the additional freedom in the tweak to develop two forms of differential-based attacks: rectangles and impossible differentials. |
Beschreibung: | xxix, 228 Seiten Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047691513 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 220119s2021 gw |||| m||| 00||| eng d | ||
035 | |a (OCoLC)1282169729 | ||
035 | |a (DE-599)KXP1776029089 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-83 |a DE-355 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a List, Eik |e Verfasser |0 (DE-588)124494520X |4 aut | |
245 | 1 | 0 | |a Design, analysis, and implementation of symmetric-key (authenticated) ciphers |c Eik List |
264 | 1 | |a Weimar |c 2021 | |
300 | |a xxix, 228 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Bauhaus-Universität Weimar |d 2021 | ||
520 | 3 | |a Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank transactions or exchanging sensitive information. Those high-level protocols can naturally be only as secure as the authentication or encryption schemes underneath. Moreover, on a more detailed level, those schemes can also at best inherit the security of their underlying primitives. While widespread standards in modern symmetric-key cryptography, such as the Advanced Encryption Standard (AES), have shown to resist analysis until now, closer analysis and design of related primitives can deepen our understanding. The present thesis consists of two parts that portray six contributions: The first part considers block-cipher cryptanalysis of the round-reduced AES, the AES-based tweakable block cipher Kiasu-BC, and TNT. | |
520 | 3 | |a The second part studies the design, analysis, and implementation of provably secure authenticated encryption schemes. In general, cryptanalysis aims at finding distinguishable properties in the output distribution. Block ciphers are a core primitive of symmetric-key cryptography which are useful for the construction of various higher-level schemes, ranging from authentication, encryption, authenticated encryption up to integrity protection. Therefore, their analysis is crucial to secure cryptographic schemes at their lowest level. With rare exceptions, block-cipher cryptanalysis employs a systematic strategy of investigating known attack techniques. Modern proposals are expected to be evaluated against these techniques. The considerable effort for evaluation, however, demands efforts not only from the designers but also from external sources. The Advanced Encryption Standard (AES) is one of the most widespread block ciphers nowadays. | |
520 | 3 | |a Therefore, it is naturally an interesting target for further analysis. Tweakable block ciphers augment the usual inputs of a secret key and a public plaintext by an additional public input called tweak. Among various proposals through the previous decade, this thesis identifies Kiasu-BC as a noteworthy attempt to construct a tweakable block cipher that is very close to the AES. Hence, its analysis intertwines closely with that of the AES and illustrates the impact of the tweak on its security best. Moreover, it revisits a generic tweakable block cipher Tweak-and-Tweak (TNT) and its instantiation based on the round-reduced AES. The first part investigates the security of the AES against several forms of differential cryptanalysis, developing distinguishers on four to six (out of ten) rounds of AES. For Kiasu-BC, it exploits the additional freedom in the tweak to develop two forms of differential-based attacks: rectangles and impossible differentials. | |
650 | 0 | 7 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Cryptanalysis | |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |D s |
689 | 0 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | |5 DE-604 | |
751 | |a Weimar |0 (DE-588)4065105-8 |2 gnd |4 uvp | ||
856 | 4 | 2 | |m DE-601 |q application/pdf |u http://www.gbv.de/dms/weimar/toc/1776029089_toc.pdf |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033075510 |
Datensatz im Suchindex
_version_ | 1804183179274223616 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | List, Eik |
author_GND | (DE-588)124494520X |
author_facet | List, Eik |
author_role | aut |
author_sort | List, Eik |
author_variant | e l el |
building | Verbundindex |
bvnumber | BV047691513 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1282169729 (DE-599)KXP1776029089 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04420nam a2200445 c 4500</leader><controlfield tag="001">BV047691513</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220119s2021 gw |||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1282169729</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1776029089</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">List, Eik</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124494520X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design, analysis, and implementation of symmetric-key (authenticated) ciphers</subfield><subfield code="c">Eik List</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Weimar</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxix, 228 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Bauhaus-Universität Weimar</subfield><subfield code="d">2021</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank transactions or exchanging sensitive information. Those high-level protocols can naturally be only as secure as the authentication or encryption schemes underneath. Moreover, on a more detailed level, those schemes can also at best inherit the security of their underlying primitives. While widespread standards in modern symmetric-key cryptography, such as the Advanced Encryption Standard (AES), have shown to resist analysis until now, closer analysis and design of related primitives can deepen our understanding. The present thesis consists of two parts that portray six contributions: The first part considers block-cipher cryptanalysis of the round-reduced AES, the AES-based tweakable block cipher Kiasu-BC, and TNT. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The second part studies the design, analysis, and implementation of provably secure authenticated encryption schemes. In general, cryptanalysis aims at finding distinguishable properties in the output distribution. Block ciphers are a core primitive of symmetric-key cryptography which are useful for the construction of various higher-level schemes, ranging from authentication, encryption, authenticated encryption up to integrity protection. Therefore, their analysis is crucial to secure cryptographic schemes at their lowest level. With rare exceptions, block-cipher cryptanalysis employs a systematic strategy of investigating known attack techniques. Modern proposals are expected to be evaluated against these techniques. The considerable effort for evaluation, however, demands efforts not only from the designers but also from external sources. The Advanced Encryption Standard (AES) is one of the most widespread block ciphers nowadays. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Therefore, it is naturally an interesting target for further analysis. Tweakable block ciphers augment the usual inputs of a secret key and a public plaintext by an additional public input called tweak. Among various proposals through the previous decade, this thesis identifies Kiasu-BC as a noteworthy attempt to construct a tweakable block cipher that is very close to the AES. Hence, its analysis intertwines closely with that of the AES and illustrates the impact of the tweak on its security best. Moreover, it revisits a generic tweakable block cipher Tweak-and-Tweak (TNT) and its instantiation based on the round-reduced AES. The first part investigates the security of the AES against several forms of differential cryptanalysis, developing distinguishers on four to six (out of ten) rounds of AES. For Kiasu-BC, it exploits the additional freedom in the tweak to develop two forms of differential-based attacks: rectangles and impossible differentials. </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptanalysis</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="751" ind1=" " ind2=" "><subfield code="a">Weimar</subfield><subfield code="0">(DE-588)4065105-8</subfield><subfield code="2">gnd</subfield><subfield code="4">uvp</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DE-601</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://www.gbv.de/dms/weimar/toc/1776029089_toc.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033075510</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV047691513 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:57:24Z |
indexdate | 2024-07-10T09:19:20Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033075510 |
oclc_num | 1282169729 |
open_access_boolean | |
owner | DE-83 DE-355 DE-BY-UBR |
owner_facet | DE-83 DE-355 DE-BY-UBR |
physical | xxix, 228 Seiten Diagramme |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
record_format | marc |
spelling | List, Eik Verfasser (DE-588)124494520X aut Design, analysis, and implementation of symmetric-key (authenticated) ciphers Eik List Weimar 2021 xxix, 228 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Dissertation Bauhaus-Universität Weimar 2021 Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank transactions or exchanging sensitive information. Those high-level protocols can naturally be only as secure as the authentication or encryption schemes underneath. Moreover, on a more detailed level, those schemes can also at best inherit the security of their underlying primitives. While widespread standards in modern symmetric-key cryptography, such as the Advanced Encryption Standard (AES), have shown to resist analysis until now, closer analysis and design of related primitives can deepen our understanding. The present thesis consists of two parts that portray six contributions: The first part considers block-cipher cryptanalysis of the round-reduced AES, the AES-based tweakable block cipher Kiasu-BC, and TNT. The second part studies the design, analysis, and implementation of provably secure authenticated encryption schemes. In general, cryptanalysis aims at finding distinguishable properties in the output distribution. Block ciphers are a core primitive of symmetric-key cryptography which are useful for the construction of various higher-level schemes, ranging from authentication, encryption, authenticated encryption up to integrity protection. Therefore, their analysis is crucial to secure cryptographic schemes at their lowest level. With rare exceptions, block-cipher cryptanalysis employs a systematic strategy of investigating known attack techniques. Modern proposals are expected to be evaluated against these techniques. The considerable effort for evaluation, however, demands efforts not only from the designers but also from external sources. The Advanced Encryption Standard (AES) is one of the most widespread block ciphers nowadays. Therefore, it is naturally an interesting target for further analysis. Tweakable block ciphers augment the usual inputs of a secret key and a public plaintext by an additional public input called tweak. Among various proposals through the previous decade, this thesis identifies Kiasu-BC as a noteworthy attempt to construct a tweakable block cipher that is very close to the AES. Hence, its analysis intertwines closely with that of the AES and illustrates the impact of the tweak on its security best. Moreover, it revisits a generic tweakable block cipher Tweak-and-Tweak (TNT) and its instantiation based on the round-reduced AES. The first part investigates the security of the AES against several forms of differential cryptanalysis, developing distinguishers on four to six (out of ten) rounds of AES. For Kiasu-BC, it exploits the additional freedom in the tweak to develop two forms of differential-based attacks: rectangles and impossible differentials. Private-Key-Kryptosystem (DE-588)4317451-6 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Cryptanalysis (DE-588)4113937-9 Hochschulschrift gnd-content Kryptologie (DE-588)4033329-2 s Private-Key-Kryptosystem (DE-588)4317451-6 s Blockchiffre (DE-588)4323693-5 s DE-604 Weimar (DE-588)4065105-8 gnd uvp DE-601 application/pdf http://www.gbv.de/dms/weimar/toc/1776029089_toc.pdf Inhaltsverzeichnis |
spellingShingle | List, Eik Design, analysis, and implementation of symmetric-key (authenticated) ciphers Private-Key-Kryptosystem (DE-588)4317451-6 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4317451-6 (DE-588)4323693-5 (DE-588)4033329-2 (DE-588)4113937-9 |
title | Design, analysis, and implementation of symmetric-key (authenticated) ciphers |
title_auth | Design, analysis, and implementation of symmetric-key (authenticated) ciphers |
title_exact_search | Design, analysis, and implementation of symmetric-key (authenticated) ciphers |
title_exact_search_txtP | Design, analysis, and implementation of symmetric-key (authenticated) ciphers |
title_full | Design, analysis, and implementation of symmetric-key (authenticated) ciphers Eik List |
title_fullStr | Design, analysis, and implementation of symmetric-key (authenticated) ciphers Eik List |
title_full_unstemmed | Design, analysis, and implementation of symmetric-key (authenticated) ciphers Eik List |
title_short | Design, analysis, and implementation of symmetric-key (authenticated) ciphers |
title_sort | design analysis and implementation of symmetric key authenticated ciphers |
topic | Private-Key-Kryptosystem (DE-588)4317451-6 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Private-Key-Kryptosystem Blockchiffre Kryptologie Hochschulschrift |
url | http://www.gbv.de/dms/weimar/toc/1776029089_toc.pdf |
work_keys_str_mv | AT listeik designanalysisandimplementationofsymmetrickeyauthenticatedciphers |