Differential cryptanalysis on LBLOCK using differential factors

Download
2018
Öğünç, Merve
Cryptography had actually a long history and comes to today by evolving day by day. Now, it is a huge area in terms of the applications in industry and research topics in academia. Even if we do not realize, the cryptographic tools are placed in every single day of our life. To protect the information, the cryptographic algorithm is used in several areas from the basic website to smart devices. One of the classes of cryptographic algorithm is symmetric-key algorithms which cover block ciphers and stream ciphers. To evaluate the security of block ciphers, several cryptanalytic methods are used as a tool in cryptography. One of the most important methods is differential cryptanalysis. Since it is commonly used, cipher designers specify the cipher principles to be secure against differential attack. In differential cryptanalysis, attacker observes that the difference between chosen plaintexts how affects the difference between corresponding ciphertexts. After finding a relation between plaintext and ciphertext, an attacker tries to get round keys. With the recently introduced S-box property called Differential Factors, all of the attacked key bits may not be determined if the S-box has a differential factor property and that S-box is activated in the distinguisher. With advances in technology, the usage of embedded systems has increased and the needs for new cryptographic instruments has emerged. Therefore, the subclasses of cryptography become diversified. One of the diversification is lightweight cryptography. Lightweight cryptography is based on optimizing the trade-off between security, cost,and performance. With increasing use of low resource devices such as RFID tags and sensor networking in different areas,the needs for lightweight cryptographic modules have started to increase. For this reason, lightweight cryptography has become prominent for the last few years. To fulfill the need, several lightweight block ciphers have been designed such as PRESENT, SEA, LED. In this work, we briefly present some lightweight block ciphers, their cryptanalysis and corrected cryptanalysis via differential factors. LBLOCK, as one of these lightweight block ciphers, is a 32-round block cipher proposed at Applied Cryptography and Network Security Conference 2011 by Wenling Wu and Lei Zhang. In this thesis, we study on the lightweight block cipher LBLOCK and observe the differential cryptanalysis to LBLOCK.Since the attackers do not consider the differential factors while performing the attack,the time complexity needs a correction. We correct the time complexity of the attack.

Suggestions

Homomorphic encryption based on the ring learning with errors (RLWE) problem
Keskinkurt, İrem; Cenk, Murat; Department of Cryptography (2017)
The encryption techniques used to ensure data secrecy have been evolving in compliance with the developments in technology and reforming according to need. Nowadays, the increase in the amount of data that should be stored in encrypted form, has led to the need for encryption schemes that provide both the safety and the efficient usability of data. Homomorphic encryption, which enables the ability to make computations on encrypted data, is seen as one of the solutions that can meet this need. In this thesis...
Efficient implementation of TMVP-based prime field multiplication and its applications to ECC
Taşkın, Halil Kemal; Cenk, Murat; Department of Cryptography (2019)
The need for faster and practical cryptography is a research topic for decades. For elliptic curve cryptography, which is proposed independently by Koblitz and Miller in 1985 as a more efficient alternative to RSA, the applications of it in real life started after 2000s. Today, most of the popular applications and protocols like Whatsapp, Signal, iOS, Android, TLS, SSH, Bitcoin etc. make use of elliptic curve cryptography. In this thesis, we present a new representation of finite field multiplication which ...
A Survey on the provable security using indistinguishability notion on cryptographic encryption schemes
Ayar, Emre; Doğanaksoy, Ali; Koçak, Onur; Department of Cryptography (2018)
For an encryption scheme, instead of Shannon's perfect security definition, Goldwasser and Micali defined a realistic provable security called semantic security. Using indistinguishability notion, one can define security levels according to the polynomial time adversaries' capabilities such as chosen plaintext attacks (CPA) and chosen ciphertext attacks (CCA) for both symmetric and asymmetric encryption schemes in addition to the hard mathematical problems the algorithms based on. Precautions to prevent the...
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Taskin, Halil Kemal; Cenk, Murat (2020-12-03)
The need for faster and practical cryptography is a research topic for decades. In case of elliptic curve cryptography, which was proposed by Koblitz and Miller in 1985 as a more efficient alternative to RSA, the applications in real life started after 2000s. Today, most of the popular applications and protocols like Whatsapp, Signal, iOS, Android, TLS, SSH, Bitcoin etc. make use of Elliptic curve cryptography. One of the important factor for high performance elliptic curve cryptography is the finite field ...
On provable security of some public key encryption schemes
Hanoymak, Turgut; Akyıldız, Ersan; Selçuk, Ali Aydın; Department of Cryptography (2012)
In this thesis, we analyse the security criteria of some public key encryption schemes. In this respect, we present the notion of adversarial goals and adversarial capabilities. We give the definition of provably security by means of several games between the challenger and the adversary in some security models, namely the standard model and the random oracle model. We state the main differences between these two models and observe the advantage of the success probability of the adversary in breaking the cr...
Citation Formats
M. Öğünç, “Differential cryptanalysis on LBLOCK using differential factors,” M.S. - Master of Science, Middle East Technical University, 2018.