Reference : Design, Cryptanalysis and Protection of Symmetric Encryption Algorithms
Dissertations and theses : Doctoral thesis
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/52955
Design, Cryptanalysis and Protection of Symmetric Encryption Algorithms
English
Cardoso Dos Santos, Luan mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
2022
University of Luxembourg, ​​Luxembourg
Docteur en Informatique
[en] Symmetric-Key Cryptography ; Cryptanalysis ; Design ; Block Cipher ; Authenticated Encryption ; AEAD ; Side-Channel ; Masking ; AES
[en] This thesis covers results from several areas related to symmetric cryptography, secure and efficient implementation and is divided into four main parts:
In Part II, Benchmarking of AEAD, two articles will be presented, showing the results of the FELICS framework for Authenticated encryption algorithms, and multiarchitecture benchmarking of permutations used as construction block of AEAD algorithms.
The Sparkle family of Hash and AEAD algorithms will be shown in Part III. Sparkle is currently a finalist of the NIST call for standardization of lightweight hash and AEAD algorithms.
In Part IV, Cryptanalysis of ARX ciphers, it is discussed two cryptanalysis techniques based on differential trails, applied to ARX ciphers. The first technique, called Meet-in-the-Filter uses an offline trail record, combined with a fixed trail and a reverse differential search to propose long differential trails that are useful for key recovery.
The second technique is an extension of ARX analyzing tools, that can automate the generation of truncated trails from existing non-truncated ones, and compute the exact probability of those truncated trails.
In Part V, Masked AES for Microcontrollers, is shown a new method to efficiently compute a side-channel protected AES, based on the masking scheme described by Rivain and Prouff. This method introduces table and execution-order optimizations, as well as practical security proofs.
Faculty of Science, Technology and Medicine - FSTM
http://hdl.handle.net/10993/52955

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Thesis-PostDefense.pdfPublisher postprint1.75 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.