Search for dissertations about: "block ciphers"
Showing result 1 - 5 of 6 swedish dissertations containing the words block ciphers.
-
1. On Boolean Functions in Symmetric-Key Ciphers
Abstract : This thesis discusses new results on the design and the existence of cryptographically strong Boolean functions used in the design of stream and block ciphers. By interlinking theoretical results and computer search some open problems have been solved, that is, we have shown the existence of previously unknown classes of functions. READ MORE
-
2. On Some Symmetric Lightweight Cryptographic Designs
Abstract : This dissertation presents cryptanalysis of several symmetric lightweight primitives, both stream ciphers and block ciphers. Further, some aspects of authentication in combination with a keystream generator is investigated, and a new member of the Grain family of stream ciphers, Grain-128a, with built-in support for authentication is presented. READ MORE
-
3. Cryptanalysis of Selected Stream Ciphers
Abstract : The aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSR-H v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. READ MORE
-
4. On LFSR based Stream Ciphers - analysis and design
Abstract : Stream ciphers are cryptographic primitives used to ensure privacy in digital communication. In this thesis we focus on stream ciphers built using Linear Feedback Shift Registers (LFSRs). Several different stream ciphers are analysed and new attacks are presented. In addition, two new stream ciphers are presented, both based on the same design. READ MORE
-
5. Design and Implementation of Efficient and Secure Lightweight Cryptosystems
Abstract : In recent years there has been a wide-spread deployment of battery-powered and passive devices such as RFID tags, systems with very strong limitations on area, cost and power budgets. Deploying cryptographic solutions for these systems is both important, because it could unlock several security-critical applications, and challenging, due to the stringent budgets: the overheads of even the smallest block ciphers are often one or more orders of magnitude too high. READ MORE