Più di un milione di libri, a un clic di distanza!
Bookbot

Andrey Bogdanov

    Analysis and design of block cipher constructions
    Security, privacy, and applied cryptography engineering
    • This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.

      Security, privacy, and applied cryptography engineering
    • This thesis focuses on symmetric cryptographic algorithms, emphasizing block ciphers, hash functions, and message authentication codes derived from block ciphers. It explores three primary approaches to cryptanalysis: mathematical analysis of block cipher constructions using statistical cryptanalysis, practical attacks on existing symmetric cryptosystems, and novel techniques leveraging side-channel leakage. The security of unbalanced Feistel networks with contracting MDS diffusion is examined concerning differential and linear cryptanalysis, proving upper bounds on differential trail probabilities and linear probabilities. These networks demonstrate high efficiency, comparable to balanced constructions. Additionally, ultra-lightweight substitution-permutation networks are proposed, resulting in lightweight block ciphers and compression functions suitable for RFID tags. The work also investigates practical attacks on real-world systems, including the KeeLoq block cipher, used in automotive access control, and the A5/2 stream cipher for GSM connections. It presents linear slide attacks on KeeLoq, identifying severe weaknesses in its key management and authentication protocols. A specialized hardware architecture for attacking A5/2 enables real-time key recovery within one second. Furthermore, the thesis addresses cryptanalysis methods utilizing side-channel leakage, proposing optimizations for side-channel collision attacks, i

      Analysis and design of block cipher constructions