Reference : Cryptanalysis and design of symmetric primitives
Dissertations and theses : Doctoral thesis
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/15579
Cryptanalysis and design of symmetric primitives
English
Nicolic, Ivica [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
23-Feb-2011
University of Luxembourg, ​Luxembourg, ​​Luxembourg
Docteur en Informatique
Biryukov, Alex mailto
[en] CRYPTANALYSIS ; SHA-3 ; BLOCK CIPHER ; HASH FUNCTION ; DIFFERENTIAL
[en] Cryptographic primitives are the basic building blocks of various cryptographic systems and protocols. Their application is based on their well established properties. The security of a crypto system is proven under the assumption that the underlying cryptographic primitives provide some specific security levels. Therefore it is critical to use primitives that can meet these requirements. However, there is no general approach of constructing fast and provably secure primitives. Rather, the primitives undergo years of thorough cryptanalysis and only after no attacks have been found, they can be considered for real world applications.

This PhD thesis deals with the two main cryptographic primitives: block ciphers and cryptographic hash functions. The main contribution lies in presenting attacks on these algorithms. The analysis ranges from finding ad-hoc differential trails that are used for collision search and distinguishers on specific hash functions to automatic search tools that give the optimal differential trails for block ciphers. Weaknesses are shown for a number of SHA-3 candidates in the framework of rotational distinguishers and meet in-the-middle based preimage attacks.
http://hdl.handle.net/10993/15579

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Nikolik-Thesis.pdfAuthor postprint1.23 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.