On the Implementation of Mathematical Backdoor in Cryptographic Algorithms and Protocols / (Record no. 615836)

000 -LEADER
fixed length control field 05094nam a22001457a 4500
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,FAH
245 ## - TITLE STATEMENT
Title On the Implementation of Mathematical Backdoor in Cryptographic Algorithms and Protocols /
Statement of responsibility, etc. Shah Fahd
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. 2024
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 122 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note In a digital universe of widespread technological gadgets, cryptographic algorithms and<br/>protocols remain integral to human beings, directly or indirectly. Followed by the recent<br/>terrorism activities, the law enforcement agencies across the globe show utter disappointment<br/>and helplessness over the utilization of strong encryption algorithms by criminals<br/>and terrorists. Recently, Australia and the United States of America have tried to legalize<br/>unlocking encrypted communications to curb terrorist activities. The earlier US<br/>government attempts of the key escrow technology, standardization in FIPS-185 and<br/>Snowden’s revelations are not secret anymore. Similarly, the cryptographic community<br/>raised serious concerns over the possibility of alleged backdoors in the Dual EC-DRBG<br/>and Kuznyechick. But unlocking the cryptographic communication with legalized access<br/>and authorization is an attack on the human privacy.<br/>The malicious cryptographic designs and implementations are a harsh reality. Detecting<br/>malicious implementation in the black box testing environment and design-level contamination<br/>in the white box testing scenario is cumbersome; but crucially important. This<br/>research has explained different types of implementation and design-level maliciousness<br/>in cryptographic primitives. We propose a novel and efficient algorithm for the detection<br/>of linear partitioning (backdoor) in the n − bit substitution box of a block cipher<br/>with time complexity O(22n(n + 1)). The backdoored primitives available in the open<br/>literature have been analyzed with the proposed algorithm. The proposed algorithm<br/>is a proper cryptographic tool for detecting the anomalies in an S-Box. The results of<br/>the tool are validated by accurately identifying the preservable non-trivial subspaces<br/>responsible for partition-type backdoors.<br/>A designer with malicious intentions claims to camouflage intentional weakness by maintaining<br/>resistance against conventional cryptanalysis, i.e., Linear and Differential attacks.<br/>Another contribution of this thesis is the heterogeneous cryptographic profiling of the backdoored mappings. From six (6) cryptographic profiles (comprising 24 unique<br/>cryptanalytic parameters) of these primitives, analogous to the Le Chatelier’s principle<br/>it is shown that whenever a backdoor is inserted in a cryptographic primitive, the system<br/>shifts the direction to weaken other components to adjust it. On one side, these<br/>mappings provide better resistance against Linear Cryptanalysis and Side-Channel Attacks<br/>(as claimed by the designers) but achieve the upper bound against hybrid attacks,<br/>i.e., DLCT, BCT and FBCT, making it a hotspot for high-order differential attacks. It<br/>is also proved that the preservable linear partitions in these designs are vulnerable to<br/>differential cryptanalysis and truncated differential attacks with significant probability<br/>if the chosen plaintext pairs are carefully selected.<br/>For proof of concept, the differential and truncated differential analysis of KG Paterson<br/>design [64] shows that 50% bits remain completely undisturbed and establish a high<br/>probability differential path when the backdoor is activated; otherwise, the design works<br/>perfectly fine with zero undisturbed bits and acceptable avalanche. With these findings,<br/>we establish a statistical distinguisher for these kinds of ciphers with unitary adversarial<br/>advantage.<br/>The Affine Equivalent (AE), Extended Affine (EA) and Carlet-Charpin-Zinoviev (CCZ)<br/>equivalent mappings inherit the cryptographic profiles from the parent mappings. This<br/>dissertation shows that preservable non-trivial subspaces responsible for partitioning<br/>type backdoors are not invariant under EA and CCZ. The S-Box utilized in the Advanced<br/>Encryption Standard (AES) is not an affine equivalent of the backdoored S-Box<br/>(with linear partitions). It is also highlighted that a careful selection of affine permutation<br/>parameters for computing EA of surjective mapping is crucial for the resistance<br/>against differential cryptanalysis. It has been proved that the differential robustness<br/>remains invariant under the AE and not invariant under EA equivalence.<br/>This thesis outline a framework for inducing and detecting non-trivial preservable subspaces<br/>in the S-Box and cipher round function. It also emphasizes that extensive cryptographic<br/>profiling from a multifaceted lens is mandatory to rule out the possibility<br/>of concealment. We stress that these backdoors emerge when exposed to the detailed<br/>cryptographic analysis, irrespective of the provable resistance against specific attacks.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Information Security Thesis
9 (RLIN) 132793
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD IS Thesis
9 (RLIN) 132794
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Mian Muhammad Waseem Iqbal
9 (RLIN) 132797
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 01/17/2026   005.8,FAH MCSPhD IS-11 01/17/2026 01/17/2026 Thesis Almirah No.68, Shelf No.5
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.