Security Analysis of Block Ciphers and Block Cipher Based Constructions
This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and S...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Published: |
2015
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-mmu-ep.6878 |
---|---|
record_format |
uketd_dc |
spelling |
my-mmu-ep.68782017-09-06T15:20:54Z Security Analysis of Block Ciphers and Block Cipher Based Constructions 2015-08 Yap, Wun She QA75.5-76.95 Electronic computers. Computer science This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and SEED ciphers. These two block ciphers are the International Standardization of Organization (ISO) standards. More importantly, our results show that the MISTY1 cipher is distinguishable from an ideal cipher and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against the full CHAIN cipher based on a generalised impossible differential technique. Next, we analyse both parallelisable message authentication code (PMAC) and Galois/counter mode (GCM) against forgery and distinguishing attacks. PMAC is part of the offset codebook (OCB) mode. Both OCB and GCM are ISO standards for mode of operation and recommended by National Institute of Standards and Technology. More importantly, the attack techniques developed for GCM can be applied to Wegmen-Carter polynomial message authentication codes and counter mode encryption. Our analysis on PMAC highlights some pitfalls that designers should be mindful of when designing cryptographic schemes which exploit the same design component, specifically the constant generation method. 2015-08 Thesis http://shdl.mmu.edu.my/6878/ http://library.mmu.edu.my/diglib/onlinedb/dig_lib.php phd doctoral Multimedia University Faculty of Information Science and Technology |
institution |
Multimedia University |
collection |
MMU Institutional Repository |
topic |
QA75.5-76.95 Electronic computers Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers Computer science Yap, Wun She Security Analysis of Block Ciphers and Block Cipher Based Constructions |
description |
This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and SEED ciphers. These two block ciphers are the International Standardization of Organization (ISO) standards. More importantly, our results show that the MISTY1 cipher is distinguishable from an ideal cipher and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against the full CHAIN cipher based on a generalised impossible differential technique. Next, we analyse both parallelisable message authentication code (PMAC) and Galois/counter mode (GCM) against forgery and distinguishing attacks. PMAC is part of the offset codebook (OCB) mode. Both OCB and GCM are ISO standards for mode of operation and recommended by National Institute of Standards and Technology. More importantly, the attack techniques developed for GCM can be applied to Wegmen-Carter polynomial message authentication codes and counter mode encryption. Our analysis on PMAC highlights some pitfalls that designers should be mindful of when designing cryptographic schemes which exploit the same design component, specifically the constant generation method. |
format |
Thesis |
qualification_name |
Doctor of Philosophy (PhD.) |
qualification_level |
Doctorate |
author |
Yap, Wun She |
author_facet |
Yap, Wun She |
author_sort |
Yap, Wun She |
title |
Security Analysis of Block Ciphers and Block Cipher Based Constructions |
title_short |
Security Analysis of Block Ciphers and Block Cipher Based Constructions |
title_full |
Security Analysis of Block Ciphers and Block Cipher Based Constructions |
title_fullStr |
Security Analysis of Block Ciphers and Block Cipher Based Constructions |
title_full_unstemmed |
Security Analysis of Block Ciphers and Block Cipher Based Constructions |
title_sort |
security analysis of block ciphers and block cipher based constructions |
granting_institution |
Multimedia University |
granting_department |
Faculty of Information Science and Technology |
publishDate |
2015 |
_version_ |
1747829638958153728 |