DSpace Repository

Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques

Show simple item record

dc.contributor.author Rahman, Mostafizar
dc.date.accessioned 2022-02-07T09:15:27Z
dc.date.available 2022-02-07T09:15:27Z
dc.date.issued 2022-01
dc.identifier.citation 238p. en_US
dc.identifier.uri http://hdl.handle.net/10263/7269
dc.description Thesis is under the supervision of Prof.Goutam Paul en_US
dc.description.abstract Symmetric key cryptography refers to the encryption methods in which the same key is used by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in cryptographic algorithms in order to distinguish the algorithm, or to retrieve the plaintext from ciphertext without the knowledge of the secret key, or sometimes to recover the secret key also. In this work, in addition to using existing cryptanalysis techniques to analyze some recent ciphers, we also develop novel cryptanalysis techniques. The cryptanalysis techniques that are involved here are based on both classical and quantum computing models. In classical cryptanalysis, first of all, we break the authenticated encryption scheme FlexAEAD by mounting forgery using the devised iterated truncated differentials. Further, we mount key recover attacks on the underlying keyed permutation of FlexAEAD. We develop new techniques of cryptanalysis by augmenting yoyo game with classical, impossible and improbable differentials and its impact is shown by applying it on public permutation AESQ and AES in the known-key setting. Another new technique is developed by embedding a boomerang attack within a yoyo game, which is shown to be effective by breaking the claimed security of AES-like block ciphers. In quantum cryptanalysis, we analyze several symmetric key schemes by using Simon's algorithm or by combining Simon's with Grover's algorithms. We also provide cost estimation for mounting Grover's attack on lightweight block ciphers KATAN and Present. To strengthen the validity of our results, all practical attacks are experimentally verified. en_US
dc.language.iso en en_US
dc.publisher Indian Statistical Institute, Kolkata en_US
dc.relation.ispartofseries ISI Ph. D Thesis;TH531
dc.subject Cryptanalysis en_US
dc.subject AES en_US
dc.subject Symmetric key en_US
dc.subject boomerang en_US
dc.subject quantum cryptanalysis en_US
dc.title Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • Theses
    (ISI approved PhD theses)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account