Please use this identifier to cite or link to this item: http://hdl.handle.net/10263/7269
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRahman, Mostafizar-
dc.date.accessioned2022-02-07T09:15:27Z-
dc.date.available2022-02-07T09:15:27Z-
dc.date.issued2022-01-
dc.identifier.citation238p.en_US
dc.identifier.urihttp://hdl.handle.net/10263/7269-
dc.descriptionThesis is under the supervision of Prof.Goutam Paulen_US
dc.description.abstractSymmetric key cryptography refers to the encryption methods in which the same key is used by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in cryptographic algorithms in order to distinguish the algorithm, or to retrieve the plaintext from ciphertext without the knowledge of the secret key, or sometimes to recover the secret key also. In this work, in addition to using existing cryptanalysis techniques to analyze some recent ciphers, we also develop novel cryptanalysis techniques. The cryptanalysis techniques that are involved here are based on both classical and quantum computing models. In classical cryptanalysis, first of all, we break the authenticated encryption scheme FlexAEAD by mounting forgery using the devised iterated truncated differentials. Further, we mount key recover attacks on the underlying keyed permutation of FlexAEAD. We develop new techniques of cryptanalysis by augmenting yoyo game with classical, impossible and improbable differentials and its impact is shown by applying it on public permutation AESQ and AES in the known-key setting. Another new technique is developed by embedding a boomerang attack within a yoyo game, which is shown to be effective by breaking the claimed security of AES-like block ciphers. In quantum cryptanalysis, we analyze several symmetric key schemes by using Simon's algorithm or by combining Simon's with Grover's algorithms. We also provide cost estimation for mounting Grover's attack on lightweight block ciphers KATAN and Present. To strengthen the validity of our results, all practical attacks are experimentally verified.en_US
dc.language.isoenen_US
dc.publisherIndian Statistical Institute, Kolkataen_US
dc.relation.ispartofseriesISI Ph. D Thesis;TH531-
dc.subjectCryptanalysisen_US
dc.subjectAESen_US
dc.subjectSymmetric keyen_US
dc.subjectboomerangen_US
dc.subjectquantum cryptanalysisen_US
dc.titleCryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniquesen_US
dc.typeThesisen_US
Appears in Collections:Theses

Files in This Item:
File Description SizeFormat 
Mostafizar Rahman-thesis-2-2-2022.pdf2.81 MBAdobe PDFView/Open
Form 17 Mostafizar Rahman.pdf388.1 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.