NUST Institutional Repository

Invariant Attacks a New Tool for Cryptanalysis Toolset

Show simple item record

dc.contributor.author Shahzad, Khurram
dc.contributor.author Supervised by Dr. Fawad Khan
dc.date.accessioned 2021-11-04T06:18:57Z
dc.date.available 2021-11-04T06:18:57Z
dc.date.issued 2021-09
dc.identifier.other TIS-331
dc.identifier.other MSIS-18
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/26956
dc.description.abstract Security of block ciphers has always remained the focus of crypto research in order to establish the degree of confidence we can have on one or an entire family of block ciphers. For long, linear and differential cryptanalytic attacks provided the basis for most of the attacks against block ciphers, however, no major cipher in its full form could be successfully broken. Evolving technological landscape calls for lightweight block ciphers with simpler algorithms, key schedules, and round constants to achieve security as well as economy of size, energy, and cost in modern communication systems. This security compromise creates vulnerability of these lightweight ciphers towards modern attacks e.g., invariant attacks, interpolation attacks, boomerang attacks and many more. Newly introduced Invariant Attacks try to map a single round of an SPN cipher in the form of a polynomial under a weak key setting using a step-by-step approach. Such polynomial must be invariant (unchanging) to the linear and non-linear components over multiple rounds of the underlying cipher. These attacks have successfully been applied to break lightweight SPNs like Midori64, Scream, iScream, Print and more. Until now, individual ciphers were attacked using various forms of invariant attacks e.g., nonlinear invariant attacks, invariant subspace attacks, generalized nonlinear invariant attacks and invariant hopping attacks exploiting numerous vulnerabilities. This thesis will focus on invariant attacks against various ciphers, exploited vulnerabilities and present a cryptanalytic toolset that can be utilized to safeguard a cipher against the invariant attacks family. The toolset will provide a set of properties that if satisfied by all linear and non-linear components of a cipher in general and S-Box component in particular, will provide safety against these attacks. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Invariant Attacks a New Tool for Cryptanalysis Toolset en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account