A STATISTICAL ANALYSIS OF SOME STANDARD CIPHERS’ CRYPTOGRAPHIC PRIMITIVES

Download
Author
Zillmer, Devon
Date
2021-06Advisor
Stanica, Pantelimon
Bassett, Robert L.
Second Reader
Martinsen, Thor
Metadata
Show full item recordAbstract
Encryption is ubiquitous in the modern environment. While public/private key architecture has provided an amazing and powerful way to encrypt information so that only one intended recipient can decrypt, the computation required for this approach means that this encryption method can quickly grow extremely expensive. With that in mind, there are a variety of open-source stream ciphers that seek to provide relatively inexpensive stream ciphers to securely encrypt information. But these stream ciphers all operate using very different techniques to generate their keystream, as seen in the stark differences in paradigms between ciphers. As such, it is not immediately clear what operations are required to achieve the desired level of encryption. What cryptographic primitives are most common or efficacious in achieving security? Examining the Data Encryption Standard, Advanced Encryption Standard, and the stream cipher winners of the eStream II competition, an underlying trend composed of two operations emerges. Despite observing no clear n-grams defining precise cryptographic primitives, we identify a general structure common to all stream ciphers. Additionally, we identify that substitution boxes or multiplication operations are not necessary for stream ciphers, whereas addition and rotation operations seem to be essential.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Analysis on Boolean function in a restricted (biased) domain
Maitra, S.; Mandal, B.; Martinsen, T.; Roy, D.|Stănică, P. (IEEE, 2020);distributed. However, in the case of some stream ciphers, a keystream bit is generated by using a nonlinear Boolean function with inputs from a restricted domain. At Eurocrypt 2016, one such stream cipher (FLIP) has been ... -
Cryptology Management in a Quantum Computing Era
Rosenberg, Nathanial Owen (Monterey, California. Naval Postgraduate School, 2012-06);Todays most efficient and widely used cryptographic standards such as RSA rely on the difficulty of factoring large numbers to resist cryptanalysis. Asymmetric cryptography is used in a plethora of sensitive operations ... -
C-DIFFERENTIALS AND GENERALIZED CRYPTOGRAPHIC PROPERTIES OF VECTORIAL BOOLEAN AND P-ARY FUNCTIONS
Geary, Aaron C. (Monterey, CA; Naval Postgraduate School, 2022-06);This dissertation investigates a newly defined cryptographic differential, called a c-differential, and its relevance to the nonlinear substitution boxes of modern symmetric block ciphers. We generalize the notions of ...