On the Implementation of Mathematical Backdoor in Cryptographic Algorithms and Protocols / (Record no. 615836)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05094nam a22001457a 4500 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8,FAH |
| 245 ## - TITLE STATEMENT | |
| Title | On the Implementation of Mathematical Backdoor in Cryptographic Algorithms and Protocols / |
| Statement of responsibility, etc. | Shah Fahd |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Rawalpindi, |
| Name of publisher, distributor, etc. | MCS (NUST), |
| Date of publication, distribution, etc. | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxi, 122 p |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | In a digital universe of widespread technological gadgets, cryptographic algorithms and<br/>protocols remain integral to human beings, directly or indirectly. Followed by the recent<br/>terrorism activities, the law enforcement agencies across the globe show utter disappointment<br/>and helplessness over the utilization of strong encryption algorithms by criminals<br/>and terrorists. Recently, Australia and the United States of America have tried to legalize<br/>unlocking encrypted communications to curb terrorist activities. The earlier US<br/>government attempts of the key escrow technology, standardization in FIPS-185 and<br/>Snowden’s revelations are not secret anymore. Similarly, the cryptographic community<br/>raised serious concerns over the possibility of alleged backdoors in the Dual EC-DRBG<br/>and Kuznyechick. But unlocking the cryptographic communication with legalized access<br/>and authorization is an attack on the human privacy.<br/>The malicious cryptographic designs and implementations are a harsh reality. Detecting<br/>malicious implementation in the black box testing environment and design-level contamination<br/>in the white box testing scenario is cumbersome; but crucially important. This<br/>research has explained different types of implementation and design-level maliciousness<br/>in cryptographic primitives. We propose a novel and efficient algorithm for the detection<br/>of linear partitioning (backdoor) in the n − bit substitution box of a block cipher<br/>with time complexity O(22n(n + 1)). The backdoored primitives available in the open<br/>literature have been analyzed with the proposed algorithm. The proposed algorithm<br/>is a proper cryptographic tool for detecting the anomalies in an S-Box. The results of<br/>the tool are validated by accurately identifying the preservable non-trivial subspaces<br/>responsible for partition-type backdoors.<br/>A designer with malicious intentions claims to camouflage intentional weakness by maintaining<br/>resistance against conventional cryptanalysis, i.e., Linear and Differential attacks.<br/>Another contribution of this thesis is the heterogeneous cryptographic profiling of the backdoored mappings. From six (6) cryptographic profiles (comprising 24 unique<br/>cryptanalytic parameters) of these primitives, analogous to the Le Chatelier’s principle<br/>it is shown that whenever a backdoor is inserted in a cryptographic primitive, the system<br/>shifts the direction to weaken other components to adjust it. On one side, these<br/>mappings provide better resistance against Linear Cryptanalysis and Side-Channel Attacks<br/>(as claimed by the designers) but achieve the upper bound against hybrid attacks,<br/>i.e., DLCT, BCT and FBCT, making it a hotspot for high-order differential attacks. It<br/>is also proved that the preservable linear partitions in these designs are vulnerable to<br/>differential cryptanalysis and truncated differential attacks with significant probability<br/>if the chosen plaintext pairs are carefully selected.<br/>For proof of concept, the differential and truncated differential analysis of KG Paterson<br/>design [64] shows that 50% bits remain completely undisturbed and establish a high<br/>probability differential path when the backdoor is activated; otherwise, the design works<br/>perfectly fine with zero undisturbed bits and acceptable avalanche. With these findings,<br/>we establish a statistical distinguisher for these kinds of ciphers with unitary adversarial<br/>advantage.<br/>The Affine Equivalent (AE), Extended Affine (EA) and Carlet-Charpin-Zinoviev (CCZ)<br/>equivalent mappings inherit the cryptographic profiles from the parent mappings. This<br/>dissertation shows that preservable non-trivial subspaces responsible for partitioning<br/>type backdoors are not invariant under EA and CCZ. The S-Box utilized in the Advanced<br/>Encryption Standard (AES) is not an affine equivalent of the backdoored S-Box<br/>(with linear partitions). It is also highlighted that a careful selection of affine permutation<br/>parameters for computing EA of surjective mapping is crucial for the resistance<br/>against differential cryptanalysis. It has been proved that the differential robustness<br/>remains invariant under the AE and not invariant under EA equivalence.<br/>This thesis outline a framework for inducing and detecting non-trivial preservable subspaces<br/>in the S-Box and cipher round function. It also emphasizes that extensive cryptographic<br/>profiling from a multifaceted lens is mandatory to rule out the possibility<br/>of concealment. We stress that these backdoors emerge when exposed to the detailed<br/>cryptographic analysis, irrespective of the provable resistance against specific attacks. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | PhD Information Security Thesis |
| 9 (RLIN) | 132793 |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | PhD IS Thesis |
| 9 (RLIN) | 132794 |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Supervised by Mian Muhammad Waseem Iqbal |
| 9 (RLIN) | 132797 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Thesis |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | Thesis | 01/17/2026 | 005.8,FAH | MCSPhD IS-11 | 01/17/2026 | 01/17/2026 | Thesis | Almirah No.68, Shelf No.5 |
