Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Sohaib Rana, 01-247201-016 | |
dc.date.accessioned | 2023-02-20T06:10:59Z | |
dc.date.available | 2023-02-20T06:10:59Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://hdl.handle.net/123456789/14922 | |
dc.description | Supervised by Dr. Najam ul Islam | en_US |
dc.description.abstract | The size of devices has decreased as a result of rapidly developing smart technology, but neither processing power nor memory have been impacted. On these limited resource devices, it is required to adopt lightweight cryptographic protocols. Sometimes, because of resource constraints, these protocols may become highly prone to cryptographic attacks. So, to ensure the design and evaluation of provably secure cryptographic protocols, NIST introduced the lightweight cryptography standardization project. The most common techniques used to evaluate the security of block ciphers are differential, linear, and differential-linear cryptanalysis. Differential attack is a chosen plain-text attack, but linear attack is a known plain-text attack. In the differential-linear attack, the combination of differential and linear attacks was used. But there have been numerous concerns regarding the complexity of these attacks. Therefore, a relatively newer technique termed as Differential Linear Connectivity Table (DLCT) has recently been presented as a tool to address the limitations of differential-linear cryptanalysis, which require that the differential distinguisher and the linear distinguisher be independent of one another. In this research we utilized the proposed DLCT method to analyze the 25-round RECTANGLE block cipher, leveraging a 15-round differential-linear distinguisher. Furthermore, we provide the analysis of the algorithms along with the time and data complexity. We have also compared our results with state-of-the-art as well.Furthermore, we present a detailed trails algorithm that recovers the best probabilities 2−34.08, so we need approximately 235 of data for key recovery, so attack data complexity is 235 | en_US |
dc.language.iso | en | en_US |
dc.publisher | Computer Sciences | en_US |
dc.relation.ispartofseries | MS (IS);T-01906 | |
dc.subject | Cryptanalysis Trails | en_US |
dc.subject | Block Ciphers | en_US |
dc.title | Differential Linear Cryptanalysis Trails for Block Ciphers using DLCT | en_US |
dc.type | MS Thesis | en_US |