Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives

In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this t...

Full description

Saved in:
Bibliographic Details
Main Author: Pang, Kok An
Format: Thesis
Language:English
English
Published: 2021
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/25994/1/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
http://eprints.utem.edu.my/id/eprint/25994/2/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this thesis, cryptanalysis on selected lightweight symmetric-key ciphers, which are the Fruit-80 stream cipher, the CRAFT block cipher and the CHAM family of block ciphers, are presented. The objective of this thesis is to study the security level of selected lightweight ciphers, namely Fruit-80, CRAFT and CHAM, to apply cryptanalytic techniques on the selected ciphers, and to study the impact of the cryptanalytic techniques on these three ciphers. The research framework for cryptanalysis of block ciphers and stream ciphers are discussed, which is divided into five phases, namely, literature review, determining research requirements, evaluation of cipher’s properties, result assessment and documentation. First, the security of the Fruit-80 stream cipher is investigated with regard to the existence of slid key-IV pairs (also known as slid pairs). By using a Mixed Integer Linear Programming (MILP) solver, slid pairs can be generated trivially. The result shows that slid pairs do exist in Fruit-80, which also implies the existence of more than one key-IV pair that can generate an identical keystream. Next, security evaluation on the CRAFT block cipher against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading the Hamming weight leakage after the first round and the second round of CRAFT, the whole secret key can be recovered within a practical time. This attack shows that CRAFT does not necessarily provide protection for all side channel attacks although the designers of CRAFT claims that CRAFT is secure against differential fault attack, which is also a side channel attack. Finally, the security evaluation of CHAM from the perspective of its key scheduling is also analysed. The correlation between master key difference and round key difference is measured. It is found that the number of different master key bits is almost proportional to the number of different round key bits in all CHAM block ciphers, suggesting that the key scheduling used in CHAM family of block ciphers has a weak diffusion. The key scheduling of CHAM is also evaluated for existence of repeated differential pattern. The results show that all CHAM variants possess strong repeated differential patterns. This thesis provides insights to future studies such as analysis in slid pairs of the Fruit and Fruit-128 stream ciphers, full key recovery by side-channel attacks on the CRAFT block cipher, and related-key cryptanalysis on the CHAM block ciphers based on their repeated differential patterns.