Security Analysis of Block Ciphers and Block Cipher Based Constructions

This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and S...

全面介紹

Saved in:
書目詳細資料
主要作者: Yap, Wun She
格式: Thesis
出版: 2015
主題:
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
id my-mmu-ep.6878
record_format uketd_dc
spelling my-mmu-ep.68782017-09-06T15:20:54Z Security Analysis of Block Ciphers and Block Cipher Based Constructions 2015-08 Yap, Wun She QA75.5-76.95 Electronic computers. Computer science This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and SEED ciphers. These two block ciphers are the International Standardization of Organization (ISO) standards. More importantly, our results show that the MISTY1 cipher is distinguishable from an ideal cipher and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against the full CHAIN cipher based on a generalised impossible differential technique. Next, we analyse both parallelisable message authentication code (PMAC) and Galois/counter mode (GCM) against forgery and distinguishing attacks. PMAC is part of the offset codebook (OCB) mode. Both OCB and GCM are ISO standards for mode of operation and recommended by National Institute of Standards and Technology. More importantly, the attack techniques developed for GCM can be applied to Wegmen-Carter polynomial message authentication codes and counter mode encryption. Our analysis on PMAC highlights some pitfalls that designers should be mindful of when designing cryptographic schemes which exploit the same design component, specifically the constant generation method. 2015-08 Thesis http://shdl.mmu.edu.my/6878/ http://library.mmu.edu.my/diglib/onlinedb/dig_lib.php phd doctoral Multimedia University Faculty of Information Science and Technology
institution Multimedia University
collection MMU Institutional Repository
topic QA75.5-76.95 Electronic computers
Computer science
spellingShingle QA75.5-76.95 Electronic computers
Computer science
Yap, Wun She
Security Analysis of Block Ciphers and Block Cipher Based Constructions
description This thesis contributes to the security analysis of block ciphers and block cipher based constructions which include message authentication codes, block cipher modes of operation and image encryption schemes. First, we present the best cryptanalytic results on two block ciphers, namely, MISTY1 and SEED ciphers. These two block ciphers are the International Standardization of Organization (ISO) standards. More importantly, our results show that the MISTY1 cipher is distinguishable from an ideal cipher and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against the full CHAIN cipher based on a generalised impossible differential technique. Next, we analyse both parallelisable message authentication code (PMAC) and Galois/counter mode (GCM) against forgery and distinguishing attacks. PMAC is part of the offset codebook (OCB) mode. Both OCB and GCM are ISO standards for mode of operation and recommended by National Institute of Standards and Technology. More importantly, the attack techniques developed for GCM can be applied to Wegmen-Carter polynomial message authentication codes and counter mode encryption. Our analysis on PMAC highlights some pitfalls that designers should be mindful of when designing cryptographic schemes which exploit the same design component, specifically the constant generation method.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Yap, Wun She
author_facet Yap, Wun She
author_sort Yap, Wun She
title Security Analysis of Block Ciphers and Block Cipher Based Constructions
title_short Security Analysis of Block Ciphers and Block Cipher Based Constructions
title_full Security Analysis of Block Ciphers and Block Cipher Based Constructions
title_fullStr Security Analysis of Block Ciphers and Block Cipher Based Constructions
title_full_unstemmed Security Analysis of Block Ciphers and Block Cipher Based Constructions
title_sort security analysis of block ciphers and block cipher based constructions
granting_institution Multimedia University
granting_department Faculty of Information Science and Technology
publishDate 2015
_version_ 1747829638958153728