首页> 外文OA文献 >Applications of finite field computation to cryptology : extension field arithmetic in public key systems and algebraic attacks on stream ciphers
【2h】

Applications of finite field computation to cryptology : extension field arithmetic in public key systems and algebraic attacks on stream ciphers

机译:有限域计算在密码学中的应用:公钥系统中的扩展域算法和流密码的代数攻击

摘要

In this digital age, cryptography is largely built in computer hardware or software as discrete structures. One of the most useful of these structures is finite fields. In this thesis, we explore a variety of applications of the theory and applications of arithmetic and computation in finite fields in both the areas of cryptography and cryptanalysis. First, multiplication algorithms in finite extensions of prime fields are explored. A new algebraic description of implementing the subquadratic Karatsuba algorithm and its variants for extension field multiplication are presented. The use of cy- clotomic fields and Gauss periods in constructing suitable extensions of virtually all sizes for efficient arithmetic are described. These multiplication techniques are then applied on some previously proposed public key cryptosystem based on exten- sion fields. These include the trace-based cryptosystems such as XTR, and torus- based cryptosystems such as CEILIDH. Improvements to the cost of arithmetic were achieved in some constructions due to the capability of thorough optimisation using the algebraic description. Then, for symmetric key systems, the focus is on algebraic analysis and attacks of stream ciphers. Different techniques of computing solutions to an arbitrary system of boolean equations were considered, and a method of analysing and simplifying the system using truth tables and graph theory have been investigated. Algebraic analyses were performed on stream ciphers based on linear feedback shift registers where clock control mechanisms are employed, a category of ciphers that have not been previously analysed before using this method. The results are successful algebraic attacks on various clock-controlled generators and cascade generators, and a full algebraic analyses for the eSTREAM cipher candidate Pomaranch. Some weaknesses in the filter functions used in Pomaranch have also been found. Finally, some non-traditional algebraic analysis of stream ciphers are presented. An algebraic analysis on the word-based RC4 family of stream ciphers is performed by constructing algebraic expressions for each of the operations involved, and it is concluded that each of these operations are significant in contributing to the overall security of the system. As far as we know, this is the first algebraic analysis on a stream cipher that is not based on linear feedback shift registers. The possibility of using binary extension fields and quotient rings for algebraic analysis of stream ciphers based on linear feedback shift registers are then investigated. Feasible algebraic attacks for generators with nonlinear filters are obtained and algebraic analyses for more complicated generators with multiple registers are presented. This new form of algebraic analysis may prove useful and thereby complement the traditional algebraic attacks. This thesis concludes with some future directions that can be taken and some open questions. Arithmetic and computation in finite fields will certainly be an important area for ongoing research as we are confronted with new developments in theory and exponentially growing computer power.
机译:在这个数字时代,加密技术很大程度上内置于计算机硬件或软件中,作为离散结构。这些结构中最有用的一种是有限域。在本文中,我们探讨了密码学和密码分析领域中各种理论的应用以及算术和计算在有限域中的应用。首先,探讨了素数域有限扩展中的乘法算法。提出了实现二次Karatsuba算法及其扩展域乘法的新代数描述。描述了在有效地构建实际上所有大小的合适扩展中使用细胞周期场和高斯周期的方法。然后,将这些乘法技术应用于基于扩展字段的某些先前提出的公共密钥密码系统。这些包括基于跟踪的密码系统(例如XTR)和基于环面的密码系统(例如CEILIDH)。由于使用代数描述进行彻底优化的能力,在某些结构中实现了算术成本的改进。然后,对于对称密钥系统,重点是代数分析和流密码的攻击。考虑了计算布尔方程组任意系统解的不同技术,并研究了使用真值表和图论分析和简化系统的方法。基于线性反馈移位寄存器的流密码进行了代数分析,其中使用了时钟控制机制,这是使用此方法之前尚未进行过分析的一类密码。结果是成功地对各种时钟控制的生成器和级联生成器进行了代数攻击,并对eSTREAM密码候选Pomaranch进行了完整的代数分析。还发现了Pomaranch中使用的过滤器功能的某些弱点。最后,给出了流密码的一些非传统代数分析。通过为所涉及的每个操作构造代数表达式,对基于单词的RC4流密码家族进行了代数分析,得出的结论是,这些操作中的每一个对于提高系统的整体安全性都具有重要意义。据我们所知,这是不基于线性反馈移位寄存器的流密码的首次代数分析。然后研究了使用线性扩展移位字段和商环对基于线性反馈移位寄存器的流密码进行代数分析的可能性。获得了带有非线性滤波器的发电机的可行代数攻击,并给出了具有多个寄存器的更复杂发电机的代数分析。这种新形式的代数分析可能被证明是有用的,从而补充了传统的代数攻击。本文最后提出了一些可以采取的未来方向和一些悬而未决的问题。有限领域的算术和计算无疑将是正在进行的研究的重要领域,因为我们面临着理论上的新发展以及计算机能力的成倍增长。

著录项

  • 作者

    Wong Kenneth Koon-Ho;

  • 作者单位
  • 年度 2008
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号