Boolean functions with optimal stability of their cryptographic indicators under restriction of the inputs
在输入限制下具有最佳稳定性的布尔函数
基本信息
- 批准号:EP/W03378X/1
- 负责人:
- 金额:$ 42.74万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Research Grant
- 财政年份:2023
- 资助国家:英国
- 起止时间:2023 至 无数据
- 项目状态:未结题
- 来源:
- 关键词:
项目摘要
-Short summary-Encrypting data is essential for ensuring the security of our electronic communications. The main tool for evaluating the security of a symmetric cipher is to examine its resistance to the currently known attack techniques. The ciphers in use are built from smaller components, one of them being a cryptographic Boolean function. Its resistance to known attacks is quantified by cryptographic indicators. We investigate a type of property of Boolean functions which was very little studied before, despite its relevance to actual attacks. Namely, for several cryptographic indicators, we determine how they change when the inputs are maliciously manipulated by an attacker by restricting them to certain types of inputs. Ideally, the cryptographic indicators should be stable, i.e. not change much. We aim to answer questions like: What are the optimal values that can be achieved for the stability of the indicators? How many optimal functions are there? How to construct such functions? How to test if proposed or existing functions (from currently used ciphers) are optimal or close to optimal from this point is view?-Extended summary-Electronic communications are an essential part of everyday life for individuals and for society (e.g. online shopping, banking, e-government). Encrypting the data is a core technique for achieving security of these communications. Two types of cryptography are used: symmetric cryptography (used for the vast majority of the transmitted data) and public-key cryptography (used mainly for key exchange and digital signatures).In symmetric cryptography, the sender encrypts and the receiver decrypts using the same key; it is crucial that the key is kept secret. The symmetric ciphers such as AES (the main current standard), as well as the ciphers used in mobile phones, are built out of several smaller components. Each individual component, as well as the overall system, must satisfy certain cryptographic requirements which makes them resistant to the currently known attack techniques. This project looks at one such component, namely cryptographic Boolean functions, and several indicators that have been developed over time to quantify their resistance to the known cryptographic attacks.Attacks on symmetric ciphers go beyond intercepting encrypted data and attempting to determine the original data. In chosen plaintext attacks, the attacker manipulates the data before encryption in the hope that the corresponding encrypted data will reveal useful information about the key.One simple but effective way to manipulate the input is to only consider inputs that conform to a given pattern, eg. setting the first byte of the data to zero, or setting the first byte to the same value as the second. These examples belong to the more general class of affine subspaces, which we are focusing on in this project.Boolean functions should not only have good values of their cryptographic indicators, but also preserve these good values when subjected to the malicious manipulation of the inputs mentioned above. We will consider several cryptographic and see how they are affected by restriction to affine spaces. For each of these indicators, we will study functions which are optimal from the point of view of maintaining good values of the indicators, understand their mathematical properties, determine how many such functions exist and devise methods of constructing them. We will also examine existing ciphers and determine their behaviour from this point of view.The theoretical results will be published in research journals and conferences. The new functions that we will construct, and the values of the newly introduced parameters computed for existing benchmark functions, will be made publicly available.The new functions and properties studied in the project will contribute to ensuring that new ciphers designed in the future, as well as the protocols based on them, will be less vulnerable to attacks.
-Short summary-Encrypting data is essential for ensuring the security of our electronic communications. The main tool for evaluating the security of a symmetric cipher is to examine its resistance to the currently known attack techniques. The ciphers in use are built from smaller components, one of them being a cryptographic Boolean function. Its resistance to known attacks is quantified by cryptographic indicators. We investigate a type of property of Boolean functions which was very little studied before, despite its relevance to actual attacks. Namely, for several cryptographic indicators, we determine how they change when the inputs are maliciously manipulated by an attacker by restricting them to certain types of inputs. Ideally, the cryptographic indicators should be stable, i.e. not change much. We aim to answer questions like: What are the optimal values that can be achieved for the stability of the indicators? How many optimal functions are there? How to construct such functions? How to test if proposed or existing functions (from currently used ciphers) are optimal or close to optimal from this point is view?-Extended summary-Electronic communications are an essential part of everyday life for individuals and for society (e.g. online shopping, banking, e-government). Encrypting the data is a core technique for achieving security of these communications. Two types of cryptography are used: symmetric cryptography (used for the vast majority of the transmitted data) and public-key cryptography (used mainly for key exchange and digital signatures).In symmetric cryptography, the sender encrypts and the receiver decrypts using the same key; it is crucial that the key is kept secret. The symmetric ciphers such as AES (the main current standard), as well as the ciphers used in mobile phones, are built out of several smaller components. Each individual component, as well as the overall system, must satisfy certain cryptographic requirements which makes them resistant to the currently known attack techniques. This project looks at one such component, namely cryptographic Boolean functions, and several indicators that have been developed over time to quantify their resistance to the known cryptographic attacks.Attacks on symmetric ciphers go beyond intercepting encrypted data and attempting to determine the original data. In chosen plaintext attacks, the attacker manipulates the data before encryption in the hope that the corresponding encrypted data will reveal useful information about the key.One simple but effective way to manipulate the input is to only consider inputs that conform to a given pattern, eg. setting the first byte of the data to zero, or setting the first byte to the same value as the second. These examples belong to the more general class of affine subspaces, which we are focusing on in this project.Boolean functions should not only have good values of their cryptographic indicators, but also preserve these good values when subjected to the malicious manipulation of the inputs mentioned above. We will consider several cryptographic and see how they are affected by restriction to affine spaces. For each of these indicators, we will study functions which are optimal from the point of view of maintaining good values of the indicators, understand their mathematical properties, determine how many such functions exist and devise methods of constructing them. We will also examine existing ciphers and determine their behaviour from this point of view.The theoretical results will be published in research journals and conferences. The new functions that we will construct, and the values of the newly introduced parameters computed for existing benchmark functions, will be made publicly available.The new functions and properties studied in the project will contribute to ensuring that new ciphers designed in the future, as well as the protocols based on them, will be less vulnerable to attacks.
项目成果
期刊论文数量(1)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings
密码学和编码 - 第 19 届 IMA 国际会议,IMACC 2023,英国伦敦,2023 年 12 月 12-14 日,会议记录
- DOI:10.1007/978-3-031-47818-5_2
- 发表时间:2024
- 期刊:
- 影响因子:0
- 作者:Carlet C
- 通讯作者:Carlet C
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Ana Salagean其他文献
Parallelisation of genetic algorithms for the 2-page crossing number problem
- DOI:
10.1016/j.jpdc.2006.08.002 - 发表时间:
2007-02-01 - 期刊:
- 影响因子:
- 作者:
Hongmei He;Ondrej Sýkora;Ana Salagean;Erkki Mäkinen - 通讯作者:
Erkki Mäkinen
Ana Salagean的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
相似国自然基金
数学物理中精确可解模型的代数方法
- 批准号:11771015
- 批准年份:2017
- 资助金额:48.0 万元
- 项目类别:面上项目
相似海外基金
Dissecting Behavioral and Neural Mechanisms of Hand Dexterity after Stroke for Effective Rehabilitation
剖析中风后手部灵活性的行为和神经机制,以实现有效康复
- 批准号:
10803644 - 财政年份:2023
- 资助金额:
$ 42.74万 - 项目类别:
Use Bayesian methods to facilitate the data integration for complex clinical trials
使用贝叶斯方法促进复杂临床试验的数据集成
- 批准号:
10714225 - 财政年份:2023
- 资助金额:
$ 42.74万 - 项目类别:
On the reliability of computational algorithms in optimal control methods using highly expressive non-differentiable functions
使用高表达不可微函数的最优控制方法中计算算法的可靠性
- 批准号:
23K13359 - 财政年份:2023
- 资助金额:
$ 42.74万 - 项目类别:
Grant-in-Aid for Early-Career Scientists
Elucidation of optimal exercise conditions between brain functions and individuals with the aim of establishing tailor-made exercise prescriptions for improving brain functions
阐明大脑功能与个体之间的最佳运动条件,旨在制定改善大脑功能的量身定制的运动处方
- 批准号:
23K16696 - 财政年份:2023
- 资助金额:
$ 42.74万 - 项目类别:
Grant-in-Aid for Early-Career Scientists
Treatment of Primary Amoebic Meningoencephalitis via Modulation of Antibody Effector Functions
通过调节抗体效应器功能治疗原发性阿米巴脑膜脑炎
- 批准号:
10550175 - 财政年份:2021
- 资助金额:
$ 42.74万 - 项目类别:
Treatment of Primary Amoebic Meningoencephalitis via Modulation of Antibody Effector Functions
通过调节抗体效应器功能治疗原发性阿米巴脑膜脑炎
- 批准号:
10179955 - 财政年份:2021
- 资助金额:
$ 42.74万 - 项目类别:
Treatment of Primary Amoebic Meningoencephalitis via Modulation of Antibody Effector Functions
通过调节抗体效应器功能治疗原发性阿米巴脑膜脑炎
- 批准号:
10374907 - 财政年份:2021
- 资助金额:
$ 42.74万 - 项目类别:
Achieving Optimal Motor Function in Stroke Survivors via a Human-Centered Approach to Design an mHealth Platform
通过以人为本的方法设计移动医疗平台,实现中风幸存者的最佳运动功能
- 批准号:
10222670 - 财政年份:2020
- 资助金额:
$ 42.74万 - 项目类别:
Achieving Optimal Motor Function in Stroke Survivors via a Human-Centered Approach to Design an mHealth Platform
通过以人为本的方法设计移动医疗平台,实现中风幸存者的最佳运动功能
- 批准号:
10625298 - 财政年份:2020
- 资助金额:
$ 42.74万 - 项目类别:
Achieving Optimal Motor Function in Stroke Survivors via a Human-Centered Approach to Design an mHealth Platform
通过以人为本的方法设计移动医疗平台,实现中风幸存者的最佳运动功能
- 批准号:
10400091 - 财政年份:2020
- 资助金额:
$ 42.74万 - 项目类别: