Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives

Pang, Kok An (2021) Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives. Masters thesis, Universiti Teknikal Malaysia Melaka.

[img] Text (24 Pages)
Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives.pdf - Submitted Version

Download (465kB)
[img] Text (Full Text)
Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives.pdf - Submitted Version
Restricted to Registered users only

Download (2MB)

Abstract

In this modern era, computers are getting more lightweight and smaller in size. This advancement has caused lightweight cryptography becomes a prevalent trend. However, lightweight primitives may present undiscovered vulnerabilities that threaten the security and privacy of communications. In this thesis, cryptanalysis on selected lightweight symmetric-key ciphers, which are the Fruit-80 stream cipher, the CRAFT block cipher and the CHAM family of block ciphers, are presented. The objective of this thesis is to study the security level of selected lightweight ciphers, namely Fruit-80, CRAFT and CHAM, to apply cryptanalytic techniques on the selected ciphers, and to study the impact of the cryptanalytic techniques on these three ciphers. The research framework for cryptanalysis of block ciphers and stream ciphers are discussed, which is divided into five phases, namely, literature review, determining research requirements, evaluation of cipher’s properties, result assessment and documentation. First, the security of the Fruit-80 stream cipher is investigated with regard to the existence of slid key-IV pairs (also known as slid pairs). By using a Mixed Integer Linear Programming (MILP) solver, slid pairs can be generated trivially. The result shows that slid pairs do exist in Fruit-80, which also implies the existence of more than one key-IV pair that can generate an identical keystream. Next, security evaluation on the CRAFT block cipher against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading the Hamming weight leakage after the first round and the second round of CRAFT, the whole secret key can be recovered within a practical time. This attack shows that CRAFT does not necessarily provide protection for all side channel attacks although the designers of CRAFT claims that CRAFT is secure against differential fault attack, which is also a side channel attack. Finally, the security evaluation of CHAM from the perspective of its key scheduling is also analysed. The correlation between master key difference and round key difference is measured. It is found that the number of different master key bits is almost proportional to the number of different round key bits in all CHAM block ciphers, suggesting that the key scheduling used in CHAM family of block ciphers has a weak diffusion. The key scheduling of CHAM is also evaluated for existence of repeated differential pattern. The results show that all CHAM variants possess strong repeated differential patterns. This thesis provides insights to future studies such as analysis in slid pairs of the Fruit and Fruit-128 stream ciphers, full key recovery by side-channel attacks on the CRAFT block cipher, and related-key cryptanalysis on the CHAM block ciphers based on their repeated differential patterns.

Item Type: Thesis (Masters)
Uncontrolled Keywords: Computer security, Cryptography
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics
Divisions: Library > Tesis > FTMK
Depositing User: F Haslinda Harun
Date Deposited: 29 Sep 2022 12:06
Last Modified: 29 Sep 2022 12:06
URI: http://eprints.utem.edu.my/id/eprint/25994
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item