Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Machine learning and evolutionary computation in design and analysis of symmetric key cryptographic algorithms (CROSBI ID 460870)

Ocjenski rad | doktorska disertacija

Knežević, Karlo Machine learning and evolutionary computation in design and analysis of symmetric key cryptographic algorithms / Jakobović, Domagoj ; Picek, Stjepan (mentor); Zagreb, Fakultet elektrotehnike i računarstva, . 2023

Podaci o odgovornosti

Knežević, Karlo

Jakobović, Domagoj ; Picek, Stjepan

engleski

Machine learning and evolutionary computation in design and analysis of symmetric key cryptographic algorithms

In the field of cryptography, Boolean functions and their generalizations, known as vectorial Boolean functions or S-boxes, play a crucial role in symmetric key cryptography. The use of carefully selected S-boxes is essential for ensuring the security of ciphers, as without them, the ciphers would be susceptible to attacks. Symmetric key cryptography can be classified into stream ciphers and block ciphers, both of which use Boolean functions (including vectorial Boolean functions) for different purposes but with the common goal of improving cipher resilience against various cryptanalyses. Since other ciphers have additional requirements for Boolean functions or S-boxes, designing a cipher is a complex process that requires adherence to multiple principles to create a strong cipher. During the design phase, one must consider the properties of cryptographic primitives and the complete cipher and test them against many possible attacks to ensure their strength. While computers are heavily used in the design process for testing specific aspects of the cipher, modern ciphers are exclusively designed by human experts. However, poor implementation choices can lead to side-channel leakage, making even mathematically secure ciphers vulnerable to attackers. This thesis aims to achieve several objectives. Firstly, we demonstrate that it is possible to construct Boolean functions that satisfy the cryptographic criterion of non-linearity using a non-binary base. Secondly, we aim to build S-boxes with output dimensions smaller than input dimensions, meeting cryptographic criteria such as non-linearity and differential uniformity. The first two goals are considered challenging optimization problems, which we solve using evolutionary computing. Thirdly, we show how to automatically construct a symmetric block algorithm without requiring the intervention of human experts. Finally, we explore how to make side-channel attacks more successful by utilizing machine learning and neuroevolutionary computing.

Boolean functions, S-boxes, bent functions, evolutionary algorithms, automatic cipher construction, symmetric cryptography, side-channel attack, machine learning, semi-supervised learning, neuroevolution

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

174

06.04.2023.

obranjeno

Podaci o ustanovi koja je dodijelila akademski stupanj

Fakultet elektrotehnike i računarstva

Zagreb

Povezanost rada

Računarstvo