Publicaties
Gekozen filters:
Gekozen filters:
New Methods for Symmetric Cryptography KU Leuven
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a need for new cryptographic primitives tailored for resource-constrained environments. We focus on the design and implementation of lightweight linear layers for symmetric ciphers. We propose new constructions of lightweight MDS (Maximum Distance Separable) and near-MDS matrices. We present new cryptanalytic methods for two classes of emerging ...
It's Not My Fault On - Fault Attacks on Symmetric Cryptography KU Leuven
Symmetric cryptographic algorithms include stream ciphers, block ciphers, MAC algorithms, and hash functions. This paper discusses the generations of these algorithms and how these generations are affected by fault attacks. It also offers a perspective on approaches that could offer increasedresistance against fault attacks and other implementation attacks. © 2012 IEEE.
Public key versus symmetric key cryptography in client–server authentication protocols Vrije Universiteit Brussel
Every month, several new protocols are popping up, comparing themselves with a few others and claiming to outperform the whole state of the art. The most popular domain of protocols is the one for authentication in a client–server architecture for which both symmetric key- and public key-based protocols are being proposed. The usage of public key-based mechanisms has several consequences, not only with respect to an increased computational ...
Rotation symmetry in algebraically generated cryptographic substitution tables KU Leuven
Using some elementary properties of normal bases, we are able to show that bijective substitution tables generated from power maps or exponentiations over finite fields are linear equivalent to rotation-symmetric S-boxes. In the other direction, we show that rotation-symmetric S-boxes can always be described as a sum of power maps over finite fields. © 2007 Elsevier B.V. All rights reserved.
Mathematical Aspects of Symmetric-Key Cryptography (Wiskundige aspecten van geheime-sleutel cryptografie) KU Leuven
It is hard to overestimate the ubiquity and importance of securecommunications and information processing in modern society. Fromprivate individuals to industry or governments --- they all rely ontechnology guaranteeing the confidentiality, integrity andauthenticity of their communication. To realise these security goals,one relies on cryptographic algorithms, often totallytransparent to their users.For a cryptographic algorithm to be useful, it ...
Towards Security Notions for White-Box Cryptography KU Leuven
While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some 'executable' code with an embedded secret key. WBC, if possible, would have several applications. However, unlike obfuscation, it lacks a ...
Wigner tomography of two qubit states and quantum cryptography Vrije Universiteit Brussel
Tomography of the two-qubit density matrix shared by Alice and Bob is an essential ingredient for guaranteeing an acceptable margin of confidentiality during the establishment of a secure fresh key through the quantum key distribution scheme. We show how the Singapore protocol for key distribution is optimal from this point of view, due to the fact that it is based on so-called symmetric informationally complete positive-operator-valued measure ...
Wigner tomography of two-qubit states and quantum cryptography Vrije Universiteit Brussel
Tomography of the two-qubit density matrix shared by Alice and Bob is an essential ingredient for guaranteeing an acceptable margin of confidentiality during the establishment of a secure fresh key through the quantum key distribution scheme. We show how the Singapore protocol for key distribution is optimal from this point of view, due to the fact that it is based on so-called symmetric informationally complete positive-operator-valued measure ...
Enhanced end-to-end security through symmetric-key cryptography in wearable medical sensor networks Vrije Universiteit Brussel KU Leuven
This paper describes a security protocol and proof-of-concept implementation for wearable medical sensor devices that are deployed in hospitals. The sensor device measures the patient’s vital sign parameters and sends them to the hospital server, such that the data can be processed and stored in the EMR (Electronic Medical Record) of the patient. The proposed security protocol is based on symmetric-key cryptography and addresses the challenges ...