Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security Analysis of Lightweight Cryptographic Primitives

View through CrossRef
Symmetric key cryptographic primitives are essential to encrypt data and protect communication between parties. Due to resource constraints, some modern devices are not capable of executing traditional cryptographic algorithms. This fact necessitates new lightweight cryptographic algorithms. Current research into lightweight cryptology is vast, in part due to the National Institute of Standards and Technology's (NIST) lightweight cryptographic standardization process. There is not much research into the vulnerability to a power analysis attack created by the choice of parameters of lightweight symmetric ciphers. This dissertation develops and demonstrates white box and black box cryptanalysis models for power analysis attacks on lightweight cryptographic primitives. The white box cryptanalysis targets the GIFT-COFB family of lightweight ciphers that include NIST lightweight standard finalists, and examines the security of their substitution layers in the power analysis setting. Findings include: When deployed over fields of characteristic 2, the most used platform, the non-linearity metric provides the best prediction of susceptibility to power analysis attacks. When deployed over fields of characteristic 3, substitution boxes display a wide range of vulnerability to power analysis attacks, leading to a classification of substitution boxes into weak and strong categories. The black box cryptanalysis focuses on a proprietary cryptosystem acting between two embedded systems which require a lightweight cipher. The results of the black box cryptanalysis include a model for the decryption process of the proprietary system, and a software implementation of a prediction algorithm that predicts the plaintext giving rise to given ciphertext values. These research results shed a new light on the resilience of lightweight cryptographic protocols against side-channel and black-box attacks and help in bridging the gap between theory and practice.
Boise State University, Albertsons Library
Title: Security Analysis of Lightweight Cryptographic Primitives
Description:
Symmetric key cryptographic primitives are essential to encrypt data and protect communication between parties.
Due to resource constraints, some modern devices are not capable of executing traditional cryptographic algorithms.
This fact necessitates new lightweight cryptographic algorithms.
Current research into lightweight cryptology is vast, in part due to the National Institute of Standards and Technology's (NIST) lightweight cryptographic standardization process.
There is not much research into the vulnerability to a power analysis attack created by the choice of parameters of lightweight symmetric ciphers.
This dissertation develops and demonstrates white box and black box cryptanalysis models for power analysis attacks on lightweight cryptographic primitives.
The white box cryptanalysis targets the GIFT-COFB family of lightweight ciphers that include NIST lightweight standard finalists, and examines the security of their substitution layers in the power analysis setting.
Findings include: When deployed over fields of characteristic 2, the most used platform, the non-linearity metric provides the best prediction of susceptibility to power analysis attacks.
When deployed over fields of characteristic 3, substitution boxes display a wide range of vulnerability to power analysis attacks, leading to a classification of substitution boxes into weak and strong categories.
The black box cryptanalysis focuses on a proprietary cryptosystem acting between two embedded systems which require a lightweight cipher.
The results of the black box cryptanalysis include a model for the decryption process of the proprietary system, and a software implementation of a prediction algorithm that predicts the plaintext giving rise to given ciphertext values.
These research results shed a new light on the resilience of lightweight cryptographic protocols against side-channel and black-box attacks and help in bridging the gap between theory and practice.

Related Results

An Overview of DRAM-Based Security Primitives
An Overview of DRAM-Based Security Primitives
Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. ...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
On the Limitations of Black-Box Constructions in Cryptography
On the Limitations of Black-Box Constructions in Cryptography
Cryptography is the science of secure communication. Originating as an esoteric discipline based on heuristics, it underwent a mayor paradigm shift in the past century. Modern cryp...
Next-Generation Cryptographic Security in Multi-Cloud Enterprises: AI-Enhanced Data Privacy, Protection, and Threat-Resilient Automation
Next-Generation Cryptographic Security in Multi-Cloud Enterprises: AI-Enhanced Data Privacy, Protection, and Threat-Resilient Automation
Enterprise architectures with multiple clouds have brought unprecedented complexity to cryptographic security management, demanding out-of-the-box solutions that go beyond the old ...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem o...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...

Back to Top