Dissertation > Excellent graduate degree dissertation topics show
On the Theory and Some Key Techniques of Block Ciphers
Author: GuDaWu
Tutor: XiaoGuoZhen
School: Xi'an University of Electronic Science and Technology
Course: Cryptography
Keywords: block cipher substitution box. substitutionpermutation network key schedule algorithm multiple encryption cryptographic mode exponential permutation orthomorphic permutation differential cryptanalysis linear cryptanalysis
CLC: TN918.1
Type: PhD thesis
Year: 1998
Downloads: 540
Quote: 19
Read: Download Dissertation
Abstract
The thesis is devoted to the analysis and design of iterated block ciphers. Main contributions of this work are as follows:(1)On the basis of conditional attack and technical attack, we summarize seven items of design principals of a block cipher algorithm. Considering that multiple encryption is the best approach to increase the security of existing algorithms, we propose a ne~v triple encryption scheme NTE.(2)We deepl~?address ourselves to the essence of such cryptographic properties of a substitution box as regularity. algebric degree. nonlinearity, strict avalanche characteristics. propagation characteristics, differential uniformity and robustness, and thus negate a result in open literature. B~?means of spectral techniques we derive the relationship between the regularity and the differential distribution table of a substitution box. Also, we formulate the nonlinearity by linear structures of its nonzero combination functions.(3)We provide a substitution box, exponential permutation which has much measurable security, and give a enumerating result and a fast algorithm of calculating such permutation. An almost perfect nonlinear exponential permutation with high algebric degree is proposed. with some discussion on how to select the parameters of such permutation. The experimental result shows us a conjecture that there exists no such permutation over even dimensional space. As a way of generating substitution boxes, we briefly point out the cryptographic weakness of the exponential functions derived from such permutation. We also present two new cryptographic indexes, fixed point and cyclic structure, on which we investigate the performance of such permutation. Finally, we give a viewpoint about the application of correlation immune functions in designing substitution boxes.(4)Our discussion of the orthomorphic permutations is focused on its classification, properties, enumeration, construction and derivation. We develop a necessary and sufficient condition under which an orthomorphic permutation is linear, and also improve the method available of constructing nonlinear orthomorphic permutations. As the application of orthomorphic permutations in cryptography, we simply emphasize the advantage provided by such permutation in increasing the security of a block cipher. Meanwhile, we design a cryptographic strong boolean function.(5)The design principals of a secure key schedule are also our concern. We present three new practical key schedule schemes based on the triple encryption NTE and stream ciphers respectively.(6)In the case of the design of operation modes of a block cipher, we introduce the security and implementation principals. In view of the famous 搈ultiplicationaddition?structure, we obtain a new secure mode NPCBC, with the discussion of its strength and efficient. The result obtained appears that the NPCBC mode is much stronger than CBC mode.

Related Dissertations
 The Research of Rijndael Algorithm for Document Encryption,TP309.7
 Research of the Block Ciphers’ Capability to Asist the Differential Cryptanalysis,TN918.2
 Chaotic Network File System password,TN918.2
 Study on Character of (X+K)mod2~n and Application in Database Encryption System,TP309.7
 Security Test on Key Components of Block Ciphers and Research on Practical Securty Against Differential Cryptanalysis and Linear Cryptanalysis,TN918.1
 Design and Analysis for Diffusion Structure of Block Ciphers,TN918.1
 Property and Construction of Orthomorphic Permutations,TN918.1
 Differential Fault Analysis of Block Ciphers,TN918.1
 Differential Attack of Reducedround Block Cipher Serpent and ICEBERG,TN918.1
 Provable Security for Feistel Ciphers Containing SPN Structure,TN918.1
 On the Theory and Analysis of Cryptographic Primitives,TN918.1
 A Research of Chaotic Encryption Algorithm of Multimedia Information,TP309.7
 Sboxes based on APN function studies,TN918.1
 The Analysis and Improvement of IDEA Cryptosystem,TN918.1
 The Design and Analysis of Incremental Hash Functions Based on Block Ciphers,TN918.1
 The Research and Realization of Encryption of Frequency Hopping Radio,TN914.41
 Russia Cryptographic Service System,TN918.1
 A Design and Analysis of Block Cipher Algorithm,TN918.1
 Analysis of Blockcipher CLEFIA,TN918.1
 Design and implementation of FPGA based host XTSAES encryption card,TP309.7
 Study on Image Encryption Algorithm under the Dual Chaotic System,O415.5
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
