Login | Register

Applications of cryptanalysis methods to some symmetric key primitives

Title:

Applications of cryptanalysis methods to some symmetric key primitives

Khajooeizadeh, Anahid (2015) Applications of cryptanalysis methods to some symmetric key primitives. Masters thesis, Concordia University.

[thumbnail of Khajooeizadeh_MASc_S2015.pdf]
Preview
Text (application/pdf)
Khajooeizadeh_MASc_S2015.pdf - Accepted Version
350kB

Abstract

Block ciphers and hash functions are important cryptographic primitives that are used to secure the exchange of critical information. With the continuous increase in computational power available to attackers, information security systems including their underlying primitives need continuous improvements. Various cryptanalysis methods are used to examine the strength and weakness of hash functions and block ciphers.
In this work, we study the Lesamnta-512 and DHA-256 hash functions and the LAC authenticated encryption scheme. In particular, we study the resistance of the underlying block cipher of the Lesamnta-512 hash function against impossible differential attacks, the resistance of the DHA-256 compression function against collision attacks. We also study MAC forgery attacks against LAC. Throughout our analysis, we use different automated methods to facilitate our analysis.
For the cryptanalysis of Lesamnta-512, two automated methods are studied for finding an impossible differential path with the maximum length. Using the obtained impossible differential path, impossible differential cryptanalysis of Lesamnta-512 is performed for 16 rounds. For the DHA-256 hash function, we used an algebraic method to find collisions for its 17-step reduced compression function by deriving difference equations for each step and then solving them when the conditions for collisions are imposed on these equations.
For LAC, the differential behavior of the different operations of the cipher is represented into a set of linear equations. Then, a Mixed Integer Linear Programming (MILP) approach is used to find a high probability characteristic. This characteristic is then used to perform a forgery attack on LAC encryption authenticated cipher.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Thesis (Masters)
Authors:Khajooeizadeh, Anahid
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Information Systems Security
Date:1 April 2015
Thesis Supervisor(s):Youssef, Amr
ID Code:980008
Deposited By: ANAHID KHAJOOEIZADEH
Deposited On:13 Jul 2015 13:20
Last Modified:22 Jul 2019 17:53
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top