Search for dissertations about: "Linear cryptanalysis"

Showing result 1 - 5 of 6 swedish dissertations containing the words Linear cryptanalysis.

  1. 1. Cryptanalysis of Selected Stream Ciphers

    Author : Paul Stankovski; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Stream cipher; cryptanalysis; FCSR; state recovery; linear relations; optimal sampling; distinguisher; HC; nonrandomness; greedy bit set algorithm.;

    Abstract : The aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSR-H v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. READ MORE

  2. 2. Some Notes on Post-Quantum Cryptanalysis

    Author : Erik Mårtensson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cryptography; Post-quantum cryptography; LWE; BKW; Cryptanalysis; Lattice sieving; SVP; Lattice-based cryptography; Code-based cryptography;

    Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE

  3. 3. On Some Symmetric Lightweight Cryptographic Designs

    Author : Martin Ågren; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Lightweight cryptography; integrity; authentication; symmetric cryptography; stream ciphers; block ciphers; Grain-128a; BEAN; KTANTAN; textsc{PRINTcipher}; FCSR combiner; related-key attack; linear cryptanalysis; linear correlations; invariant subspace attack.;

    Abstract : This dissertation presents cryptanalysis of several symmetric lightweight primitives, both stream ciphers and block ciphers. Further, some aspects of authentication in combination with a keystream generator is investigated, and a new member of the Grain family of stream ciphers, Grain-128a, with built-in support for authentication is presented. READ MORE

  4. 4. Some results on fast correlation attacks

    Author : Fredrik Jönsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Technological sciences; stream ciphers; linear feedback shift registers; cryptology; correlation attacks; cryptanalysis; Teknik; Informatics; systems theory; Informatik; systemteori;

    Abstract : This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast correlation attacks on stream ciphers containing linear shift registers with an arbitrary number of taps, are considered. A general introduction to stream ciphers and correlation attacks is given. READ MORE

  5. 5. Contributions to Confidentiality and Integrity Algorithms for 5G

    Author : Jing Yang; Nätverk och säkerhet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Stream ciphers; 5G; Confidentiality and integrity algorithms; SNOW-V; SNOW-Vi; Local pseudorandom generators; SNOW 3G; ZUC-256; Linear cryptanalysis; Guess-and-determine attacks;

    Abstract : The confidentiality and integrity algorithms in cellular networks protect the transmission of user and signaling data over the air between users and the network, e.g., the base stations. READ MORE