Dissertation > Excellent graduate degree dissertation topics show
Security Analysis on Block-Like Type Stream Ciphers
Author: ZhangZhongYa
Tutor: GuanJie
School: PLA Information Engineering University
Course: Cryptography
Keywords: Stream cipher Cryptanalysis Truncated differential cryptanalysis Differential fault analysis Differential related-cipher attack Salsa20 LEX Phelix
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 28
Quote: 0
Read: Download Dissertation
Abstract
Estream, a stream cipher research project launched by ECRYPT in 2004, had received 34 candidate algorithms all over the world. We analyse the candidate algorithms in this dissertation, the object of study is one kind of stream cipher constructed by block cipher’s components or design idea ? Block-Like Type Stream Cipher. The selective analysis algorithms are Salsa20, LEX, and Phelix, which are representative of this kind of stream cipher.The main results in this dissertation are as the following:1. Two higher differential characteristics for 3-round Salsa20 are presented, and then a truncated differential cryptanalysis of 5-round Salsa20 based on solving a nonlinear equation is showed, with the computational complexity of O(2105) at most, the date complexity of O(211), the space complexity of O(211), and the success rate of 97.72%. It has been the best result of truncated differential cryptanalysis of 5-round Salsa20 by now.2. Class of equivalent fault position is proposed, and then a byte-oriented differential fault analysis on LEX using it is showed. Then the master key is recovered based on the key schedule. Theoretically, the 128-bit master key can be obtained by using 26 byte-faults. It has been the best result of differential fault analysis on LEX by now.3. Combined differential cryptanalysis with related-cipher attack, a differential related-cipher attack on LEX using chosen-plaintext attack and chosen-IV attack is given, which is based on the relativity between LEX and AES. The 128-bit master key can be obtained with the computational complexity of O(218), the date complexity of O(217), and the success rate of 99.76%.4. An algorithm is presented to solve a system of differential equations based on single-bit fault on X Y=Z. A bit-oriented differential fault analysis on Phelix based on the algorithm is showed. Theoretically, the 256-bit working key can be obtained by using 652 bit-faults, with the computational complexity of O(220).
|
Related Dissertations
- DR Stinson \,TN918.1
- ASIC Design and Applications of Stream Cipher Based on Chaos,O415.5
- Several digital chaotic cryptography analysis,O415.5
- Scalable video coding H.264/SVC layered encryption scheme,TN919.81
- Research of Secure Processor Architecture Based on Stream Cipher,TP309
- Research on International Commercial Arbitration theory of non- domestic,D997.4
- Research on Differential Power Analysis Attack on Two Kinds of Stream Ciphers,TN918.4
- Research of the Block Ciphers’ Capability to Asist the Differential Cryptanalysis,TN918.2
- Chaotic Network File System password,TN918.2
- Analysis and New Designs of Digital Chaotic Cryptosystem,TN918.1
- Fault Attacks of Stream Ciphers,TN918.1
- Study and Inplement of Chaotic Stream Ciphers Based on Perturbation,TP309.7
- Research on Several Cryptographic Properties of Primitive σ-LFSR,TN918.1
- Security Test on Key Components of Block Ciphers and Research on Practical Securty Against Differential Cryptanalysis and Linear Cryptanalysis,TN918.1
- Research on Technology of Reconfigurable Parallel Feedback Shift Register Targeted at Stream Cipher,TN918.2
- Differential Fault Analysis of Block Ciphers,TN918.1
- Research on Cryptanalysis Based on Proving NP=P,TN918.1
- The Research on Theoretical Design andAnalysis Method of Chaotic Cryptography,TN918.1
- The Study of Stream Cipher Based on the Petri Net,TN918.1
- Study on the Linear Complexity and K-error Linear Complexity of Binary Sequences with Period 2~n,TN918
- Multiple Clock-Controlled Generator and Analysis,TN918.1
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
|