Preuves de sécurité en cryptographie symétrique à l'aide de la technique du coupling. (Security proofs in symmetric cryptography using the coupling technique)

نویسنده

  • Rodolphe Lampe
چکیده

In this thesis, we study blockciphers, meaning that the encryption (and decryption)sends a block of n bits on a block of n bits. There is essentially two main structures usedfor a blockcipher: the Feistel structure (used for DES) and the SPN structure (used forAES). The study of the security of these structures and schemes has led to many practicaland theoretical advances. We present in this thesis proofs of security for the iterated Even-Mansour scheme, the tweakable blockcipher CLRW and the key-alternating Feistel cipher.These proofs use a probabilistic technique, called coupling, introduced in cryptography in2002 by Mironov [Mir02]. We present this technique in the context of probabilities, thenwe present how to use the coupling to prove the security for the schemes mentioned above.We also present an analysis of the security of the Even-Mansour cipher with two roundsand some properties (same round keys or same internal permutations for example) and,finally, we compare the different techniques to prove indistinguishability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally Sound, Automated Proofs for Security Protocols

Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographi...

متن کامل

Study and Development of a Symmetric protocol to secure communications in WSN

Résumé : Durant cette dernière décennie, les réseaux de capteurs sans fil (RCSF) ont attiré l’attention des chercheurs et des services de recherche et développement en raison de leur facilité de déploiement et de leur champs d’application dans divers domaines, y compris la sécurité et la surveillance, le contrôle, la maintenance des systèmes complexes, l’agriculture, e-santé, etc. Toutefois, en...

متن کامل

ISSN 0832-7203 An Automatic Validation Model for Security Mechanisms

In this paper, we propose a model to automatically validate the composition of multiple security mechanisms in the context of transactions between multiple participants. The goal of the validation is to demonstrate that the different security mechanisms preserve conformity to their specifications when used in combination. The underlying principle of the proposed approach is illustrated with a c...

متن کامل

Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles. (Security policies modeling by using formal methods)

ion des données : on peut définir des actions plus abstraites que lecture/écriture. Le modèle RBAC modélise le système informatique considéré en séparant les entités actives des entités passives. Les entités actives correspondent aux utilisateurs du système et les entités passives correspondent aux objets du système. Au contraire du modèle de LaPadula, qui associe des niveaux de sécurité aux di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014