Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem

This thesis documents nonlinearity analyses performed on the key generation protocol of El-Gamal AAß Cryptosystem. The main aim of this research is to improve the security of the cryptosystem with regards to its key generation protocol against linear cryptanalysis, and this is achieved through ser...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad, Miza Mumtaz
Format: Thesis
Language:English
Published: 2011
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/32525/1/IPM%202011%2016R%20EDIT.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.32525
record_format uketd_dc
spelling my-upm-ir.325252014-11-12T04:29:14Z Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem 2011-05 Ahmad, Miza Mumtaz This thesis documents nonlinearity analyses performed on the key generation protocol of El-Gamal AAß Cryptosystem. The main aim of this research is to improve the security of the cryptosystem with regards to its key generation protocol against linear cryptanalysis, and this is achieved through series of tests and evaluations of the strength of the protocol in terms of nonlinearity measurement and bijectivity evaluation. Basically, the work is done in two phases. In the first phase, the bijectivity of AAß function in the cryptosystem is evaluated. The process consisted of investigating the function in the protocol and inspecting bit distribution in the public key to determine whether it is balanced or not. In the second phase, a statistical approach based on the original work of Matsui (1993) is extended to perceive any possible linear relation between public key and ephemeral private key. There have been three major evolutional phases of the key generation protocol and the tests are done onto each of it. Though theoretically the key generation protocol is nonbijective, it still satisfies the bijectivity criterion. Also, the nonlinearity measurement of the key generation protocol is very high making it almost impossible to extend linear cryptanalysis onto it, especially for higher bit input size. Thus for 128-bit ephemeral key, it is conjectured that the success probability to guess the correct ephemeral private key using linear cryptanalysis is close to nil. However, it is easier to attack the key generation protocol using less complicated attack such as dictionary attack because only a single round of function is involved in it. Based on the findings, we propose two methods to improve the security of El-Gamal AAß cryptosystem against linear cryptanalysis. Since the nonlinearity level of the key generation protocol is phenomenal, the function in the protocol should be iterated at least twice to amplify its security. This is done not only to reduce the chance of guessing the correct ephemeral private key via linear cryptanalysis, but also to increase cryptanalysis work of dictionary attack. The second method is to multiply the generator point with a large number to increase the linear cryptanalysis work as well as obtain a better bit distribution in the public key. Nonlinear theories Cryptography Computer security 2011-05 Thesis http://psasir.upm.edu.my/id/eprint/32525/ http://psasir.upm.edu.my/id/eprint/32525/1/IPM%202011%2016R%20EDIT.pdf application/pdf en public masters Universiti Putra Malaysia Nonlinear theories Cryptography Computer security
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Nonlinear theories
Cryptography
Computer security
spellingShingle Nonlinear theories
Cryptography
Computer security
Ahmad, Miza Mumtaz
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
description This thesis documents nonlinearity analyses performed on the key generation protocol of El-Gamal AAß Cryptosystem. The main aim of this research is to improve the security of the cryptosystem with regards to its key generation protocol against linear cryptanalysis, and this is achieved through series of tests and evaluations of the strength of the protocol in terms of nonlinearity measurement and bijectivity evaluation. Basically, the work is done in two phases. In the first phase, the bijectivity of AAß function in the cryptosystem is evaluated. The process consisted of investigating the function in the protocol and inspecting bit distribution in the public key to determine whether it is balanced or not. In the second phase, a statistical approach based on the original work of Matsui (1993) is extended to perceive any possible linear relation between public key and ephemeral private key. There have been three major evolutional phases of the key generation protocol and the tests are done onto each of it. Though theoretically the key generation protocol is nonbijective, it still satisfies the bijectivity criterion. Also, the nonlinearity measurement of the key generation protocol is very high making it almost impossible to extend linear cryptanalysis onto it, especially for higher bit input size. Thus for 128-bit ephemeral key, it is conjectured that the success probability to guess the correct ephemeral private key using linear cryptanalysis is close to nil. However, it is easier to attack the key generation protocol using less complicated attack such as dictionary attack because only a single round of function is involved in it. Based on the findings, we propose two methods to improve the security of El-Gamal AAß cryptosystem against linear cryptanalysis. Since the nonlinearity level of the key generation protocol is phenomenal, the function in the protocol should be iterated at least twice to amplify its security. This is done not only to reduce the chance of guessing the correct ephemeral private key via linear cryptanalysis, but also to increase cryptanalysis work of dictionary attack. The second method is to multiply the generator point with a large number to increase the linear cryptanalysis work as well as obtain a better bit distribution in the public key.
format Thesis
qualification_level Master's degree
author Ahmad, Miza Mumtaz
author_facet Ahmad, Miza Mumtaz
author_sort Ahmad, Miza Mumtaz
title Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
title_short Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
title_full Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
title_fullStr Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
title_full_unstemmed Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
title_sort nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal aaß cryptosystem
granting_institution Universiti Putra Malaysia
publishDate 2011
url http://psasir.upm.edu.my/id/eprint/32525/1/IPM%202011%2016R%20EDIT.pdf
_version_ 1747811669535358976