Projects
Modular Analysis and Design of Hash Functions and Block Ciphers. KU Leuven
Block Ciphers and Encryption Schemes. KU Leuven
Snowden's alarming disclosures on NSA's global surveillance are an evidence of the paramount importance of cryptography to our daily lives. Also, attacks on widely used functions such as SHA-1 triggered international competitions for cryptographic functions. This project is about encryption, ranging from the construction of block ciphers (basic mathematical building blocks) to various types of encryption schemes. Encryption finds a wide range ...
Security analysis of Lightweight block ciphers (Ten Finalist in NIST's lightweight cryptography Standardization process) KU Leuven
A lot of third part analysis is being carried out against the ten cryptographic algorithms of the NIST lightweight cryptographic standardization process but a gap still exists when it comes to analyzing lightweight ciphers related to side channel attacks, Kleptographic attacks along with some other modern cryptanalysis attacks. Hence, my topic of research focuses towards the security analysis of lightweight ciphers (finalist in the ...
Mathematical aspects of evaluating the security of block ciphers with respect to linear and differential cryptanalysis. KU Leuven
Currently, the only method known to achieve absolute security, is the One-Time Pad, which uses impractically long keys. For all modern purposes we use encryption methods that have no proof of absolute security. Instead, we can prove that certain classes of attacks do not work or that they would require a very large amount of computations or certain extra information. The study of the security of encryption methods against various attacks is ...
Techniques for Block Cipher Cryptanalysis KU Leuven
The research interests of my PhD study are the analysis and design of symmetric-key primitives, especially block ciphers. Block ciphers are the basis of symmetric-key cryptography. During the last two decades, comprehensive insights on the analytic methods and the design criteria are developed. For cryptanalysts, a major question is to find good distinguishers, such as differential characteristics and linear trails. One of my main interests ...
Automated techniques for the cryptanalysis and design of symmetric-key ciphers and protocols. KU Leuven
Cryptography is the study of mathematical techniques that ensure the confidentiality and integrity of information. This relatively new field started out as classified military technology, but has now become commonplace in our daily lives. Cryptography is not only used in banking cards, secure websites and electronic signatures, but also in public transport cards, car keys and garage door openers. Two building blocks in the domain of ...
Black-box Security of White-box Ciphers KU Leuven
White-box cryptography aims to ensure the security of cryptographic algorithms against a white-box attacker. Besides, a white-box cipher should resist against black-box attacks to be assumed secure. Hence, a detailed black-box analysis study for a white-box cipher makes a significant contribution to white-box cryptography. One of the proposed white-box secure block ciphers is SPACE that is based on the Feistel network. Studies on linear and ...
Divisional Cryptanalysis of Symmetric-Key Ciphers KU Leuven
In symmetric-key cryptography, cryptanalysis is an important method to get confidence in the security of ciphers.
Integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so it is commonly known as the Square attack. It was also extended to a few other ciphers ...
Crptanalysis of ARX Ciphers KU Leuven
Cryptographic primitives are designed such that they can resist mathematical attacks (cryptanalysis). For their implementations, extra measures must be taken to also provide security against physical attacks such as side-channel analysis (SCA). One of the techniques that successfully prevents SCA is the use of masking methods, based on secret sharing and multi-party computation.
Such countermeasures significantly increase the area of a ...