NUST Institutional Repository

Security analysis of kleptographic algorithms

Show simple item record

dc.contributor.author Sajjad, Anum
dc.contributor.author Supervised by Dr Mehreen Afzal.
dc.date.accessioned 2020-10-27T06:24:10Z
dc.date.available 2020-10-27T06:24:10Z
dc.date.issued 2018-07
dc.identifier.other TIS-260
dc.identifier.other MSIS-14
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5695
dc.description.abstract Kleptography is the study of stealing the secure data secretly and subliminally. It is the subdivision of crypto-virology. The concept of inserting backdoors was introduced two decades ago by Young and Yung but still it is a serious threat for modern cryptography. The attacker uses asymmetric cryptographic techniques to build the backdoor and later uses his own private key to reconstruct the secret key of the user. Different researches proved that exploiting implementation weakness of cryptographic algorithm needs less effort as compared to attacking its mathematical structure. The SETUP (Secretly Embedded Trapdoor with Universal Protection) attack modifies the standard methods of generating public and private key pairs in such a way that the public information is meaningful for the attacker. Also, calculation of private key of the user in polynomial time is no more a hard problem for the attacker. The information leakage using backdoor does not require separate communication channel for the transmission of secret data. In present days, cryptography is using against the security of cryptosystems instead of protecting it. The user is not able to distinguish the output of an honest or a malicious cryptosystem. This research presented the brief description of the history of backdoor attacks in practical cryptographic systems. Elliptic curve cryptographic concepts are discussed in this research. Then the term Kleptography was introduced, followed by the definition of weak, regular and strong SETUP attacks. It also presents the proposed kleptographic attack strategy on a cryptographic algorithm based on elliptic curves algorithms i.e. Edwards-curve Digital Signature Algorithm, Elliptic curve Diffie-Hellman key exchange scheme, Elliptic curve Digital Signature Algorithm, Elliptic curve Integrated Encryption Scheme, Elliptic curve Menezes-Qu-Vanstone and Elliptic curve Qu-Vanstone implicit certificate scheme. In order to increase the security, the complexity of cryptographic algorithm’s implementation is also enhanced. This makes extremely hard for the user to detect such malicious codes especially when they are introduced, in the code, very innocently. Finally, the strategy of running time analysis is presented in order to detect the presence of such kinds of backdoor attacks. The experimental results shows the successful detection of malicious code in an elliptic curve based protocols. The future work concludes the research work. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Security analysis of kleptographic algorithms en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account