Cryptanalysis is an effective method for ensuring the security of cryptographic primitives by attacking them with the most advanced techniques. This thesis provides a deep investigation of three different kinds of cryptanalysis for symmetric ciphers, differential, linear and algebraic, applying them to several symmetric ciphers, from the older ones to the most modern. The algebraic approach consists in solving a polynomial system of equations representing a cryptographic primitive and involves a careful choice of the set of key variables to be fixed. The main instruments used to solve the system are Sat solvers and Grobner basis of which a comparison is offered in some cases. Particular focus has been paid to SHA1 hash function and on the stream cipher E0, used in the Bluetooth protocol. Samely, differential and linear cryptanalysis are applied to several symmetric ciphers. In particular, it is shown how to develop in Python an automatic tool for searching differential and linear trails with the constraint programming language Minizinc.

STRENGTH EVALUATION OF CRYPTOGRAPHIC PRIMITIVES TO LINEAR, DIFFERENTIAL AND ALGEBRAIC ATTACKS / S. Polese ; tutor: A. Visconti ; supervisore: A. Visconti ; coordinatore: R. Sassi. Dipartimento di Informatica Giovanni Degli Antoni, 2023 Jan 30. 35. ciclo, Anno Accademico 2022.

STRENGTH EVALUATION OF CRYPTOGRAPHIC PRIMITIVES TO LINEAR, DIFFERENTIAL AND ALGEBRAIC ATTACKS.

S. Polese
2023

Abstract

Cryptanalysis is an effective method for ensuring the security of cryptographic primitives by attacking them with the most advanced techniques. This thesis provides a deep investigation of three different kinds of cryptanalysis for symmetric ciphers, differential, linear and algebraic, applying them to several symmetric ciphers, from the older ones to the most modern. The algebraic approach consists in solving a polynomial system of equations representing a cryptographic primitive and involves a careful choice of the set of key variables to be fixed. The main instruments used to solve the system are Sat solvers and Grobner basis of which a comparison is offered in some cases. Particular focus has been paid to SHA1 hash function and on the stream cipher E0, used in the Bluetooth protocol. Samely, differential and linear cryptanalysis are applied to several symmetric ciphers. In particular, it is shown how to develop in Python an automatic tool for searching differential and linear trails with the constraint programming language Minizinc.
30-gen-2023
Settore INF/01 - Informatica
Differential Cryptanalysis; Linear Cryptanalysis; Algebraic Cryptanalysis; Cryptography; Cryptanalysis;
hdl: 2434/937526
hdl: 2434/916422
VISCONTI, ANDREA
VISCONTI, ANDREA
SASSI, ROBERTO
Doctoral Thesis
STRENGTH EVALUATION OF CRYPTOGRAPHIC PRIMITIVES TO LINEAR, DIFFERENTIAL AND ALGEBRAIC ATTACKS / S. Polese ; tutor: A. Visconti ; supervisore: A. Visconti ; coordinatore: R. Sassi. Dipartimento di Informatica Giovanni Degli Antoni, 2023 Jan 30. 35. ciclo, Anno Accademico 2022.
File in questo prodotto:
File Dimensione Formato  
phd_unimi_R12736.pdf

accesso aperto

Descrizione: Full Thesis - Final Version
Tipologia: Altro
Dimensione 586 kB
Formato Adobe PDF
586 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/949548
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact