Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives

In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this t...

Full description

Saved in:
Bibliographic Details
Main Author: Pang, Kok An
Format: Thesis
Language:English
English
Published: 2021
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/25994/1/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
http://eprints.utem.edu.my/id/eprint/25994/2/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.25994
record_format uketd_dc
spelling my-utem-ep.259942022-09-29T12:06:07Z Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives 2021 Pang, Kok An Q Science (General) QA Mathematics In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this thesis, cryptanalysis on selected lightweight symmetric-key ciphers, which are the Fruit-80 stream cipher, the CRAFT block cipher and the CHAM family of block ciphers, are presented. The objective of this thesis is to study the security level of selected lightweight ciphers, namely Fruit-80, CRAFT and CHAM, to apply cryptanalytic techniques on the selected ciphers, and to study the impact of the cryptanalytic techniques on these three ciphers. The research framework for cryptanalysis of block ciphers and stream ciphers are discussed, which is divided into five phases, namely, literature review, determining research requirements, evaluation of cipher’s properties, result assessment and documentation. First, the security of the Fruit-80 stream cipher is investigated with regard to the existence of slid key-IV pairs (also known as slid pairs). By using a Mixed Integer Linear Programming (MILP) solver, slid pairs can be generated trivially. The result shows that slid pairs do exist in Fruit-80, which also implies the existence of more than one key-IV pair that can generate an identical keystream. Next, security evaluation on the CRAFT block cipher against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading the Hamming weight leakage after the first round and the second round of CRAFT, the whole secret key can be recovered within a practical time. This attack shows that CRAFT does not necessarily provide protection for all side channel attacks although the designers of CRAFT claims that CRAFT is secure against differential fault attack, which is also a side channel attack. Finally, the security evaluation of CHAM from the perspective of its key scheduling is also analysed. The correlation between master key difference and round key difference is measured. It is found that the number of different master key bits is almost proportional to the number of different round key bits in all CHAM block ciphers, suggesting that the key scheduling used in CHAM family of block ciphers has a weak diffusion. The key scheduling of CHAM is also evaluated for existence of repeated differential pattern. The results show that all CHAM variants possess strong repeated differential patterns. This thesis provides insights to future studies such as analysis in slid pairs of the Fruit and Fruit-128 stream ciphers, full key recovery by side-channel attacks on the CRAFT block cipher, and related-key cryptanalysis on the CHAM block ciphers based on their repeated differential patterns. 2021 Thesis http://eprints.utem.edu.my/id/eprint/25994/ http://eprints.utem.edu.my/id/eprint/25994/1/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf text en public http://eprints.utem.edu.my/id/eprint/25994/2/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121297 mphil masters Universiti Teknikal Malaysia Melaka Faculty of Information and Communication Technology Abdul Latip, Shekh Faisal
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Abdul Latip, Shekh Faisal
topic Q Science (General)
QA Mathematics
spellingShingle Q Science (General)
QA Mathematics
Pang, Kok An
Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
description In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this thesis, cryptanalysis on selected lightweight symmetric-key ciphers, which are the Fruit-80 stream cipher, the CRAFT block cipher and the CHAM family of block ciphers, are presented. The objective of this thesis is to study the security level of selected lightweight ciphers, namely Fruit-80, CRAFT and CHAM, to apply cryptanalytic techniques on the selected ciphers, and to study the impact of the cryptanalytic techniques on these three ciphers. The research framework for cryptanalysis of block ciphers and stream ciphers are discussed, which is divided into five phases, namely, literature review, determining research requirements, evaluation of cipher’s properties, result assessment and documentation. First, the security of the Fruit-80 stream cipher is investigated with regard to the existence of slid key-IV pairs (also known as slid pairs). By using a Mixed Integer Linear Programming (MILP) solver, slid pairs can be generated trivially. The result shows that slid pairs do exist in Fruit-80, which also implies the existence of more than one key-IV pair that can generate an identical keystream. Next, security evaluation on the CRAFT block cipher against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading the Hamming weight leakage after the first round and the second round of CRAFT, the whole secret key can be recovered within a practical time. This attack shows that CRAFT does not necessarily provide protection for all side channel attacks although the designers of CRAFT claims that CRAFT is secure against differential fault attack, which is also a side channel attack. Finally, the security evaluation of CHAM from the perspective of its key scheduling is also analysed. The correlation between master key difference and round key difference is measured. It is found that the number of different master key bits is almost proportional to the number of different round key bits in all CHAM block ciphers, suggesting that the key scheduling used in CHAM family of block ciphers has a weak diffusion. The key scheduling of CHAM is also evaluated for existence of repeated differential pattern. The results show that all CHAM variants possess strong repeated differential patterns. This thesis provides insights to future studies such as analysis in slid pairs of the Fruit and Fruit-128 stream ciphers, full key recovery by side-channel attacks on the CRAFT block cipher, and related-key cryptanalysis on the CHAM block ciphers based on their repeated differential patterns.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Pang, Kok An
author_facet Pang, Kok An
author_sort Pang, Kok An
title Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
title_short Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
title_full Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
title_fullStr Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
title_full_unstemmed Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
title_sort cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty of Information and Communication Technology
publishDate 2021
url http://eprints.utem.edu.my/id/eprint/25994/1/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
http://eprints.utem.edu.my/id/eprint/25994/2/Cryptanalysis%20of%20fruit-80%2C%20craft%20and%20cham%20lightweight%20symmetric-key%20cryptographic%20primitives.pdf
_version_ 1747834150935592960