Indifferentiability analysis of symmetric key ciphers

dc.contributor.authorPaul, Sayantan
dc.date.accessioned2025-12-23T05:12:37Z
dc.date.available2025-12-23T05:12:37Z
dc.date.issued2025-08-26
dc.descriptionThis thesis is under the supervision of Prof. Mridul Nandien_US
dc.description.abstractThe thesis presented here analyses the security of certain selected symmetric key ciphers - The ciphers analyzed are the 2 and 3-round Confusion-Diffusion Network, the 3-round Cascade Cipher with two independent keys, and the Feistel Construction with 7 and 8 rounds. Substitution Permutation Networks (SPNs) are widely used in the design of modern symmetric cryptographic building blocks. Attacks against the 2-round Confusion-Diffusion Network construction have been exhibited by Dodis et al. (2016a) in their Eurocrypt 2016 paper titled ‘Indifferentiability of Confusion-Diffusion Networks’, and by Da, Xu and Guo (2021b) in their paper ‘Sequential Indifferentiability of Confusion-Diffusion Networks’. Both attacks mentioned above were incomplete/erroneous. As part of our first result, we provide a corrected attack on the 2-round NLCDN. Our attack on the 2-round CDN is primitive-construction-sequential, implying that the construction is not secure even in the weaker sequential indifferentiability setting of Mandal, Patarin and Seurin (2012a). The second part of our first results focuses on Cascade Ciphers. We present an attack on the 3-round cascade construction employing any 2n-bit to 3n-bit non-idealized key scheduling function, generalising the heuristic attack based on ’certain’ stronger key schedules as described by Guo, Lin and Liu (2016) in ‘Revisiting Cascade Ciphers in Indifferentiability Setting’. Next, as a follow up of the above work, we show that the 3-round Confusion-Diffusion Network construction with linear diffusion layers is indifferentiable from an ideal permutation. This, in conjunction with the previous negative result, shows the tightness of our indifferentiability result. The final work in this thesis explores the Feistel construction. There have been a series of studies on whether an ideal cipher can be built from a random oracle using a Feistel network. We present a general proof framework that lets us prove the indifferentiability of 7 or more rounds of Feistel. In particular, this is the first indifferentiability proof for 7-round Feistel, and in addition, the 8-round proof is considerably simpler than the previously-known proof.en_US
dc.identifier.citation122p.en_US
dc.identifier.urihttp://hdl.handle.net/10263/7633
dc.language.isoenen_US
dc.publisherIndian Statistical Institute, Kolkataen_US
dc.relation.ispartofseriesISI PhD Thesis;TH664
dc.subjectIndifferentiability, Block cipher, permutation, random functionen_US
dc.titleIndifferentiability analysis of symmetric key ciphersen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Thesis-Sayantan Paul.pdf
Size:
1.27 MB
Format:
Adobe Portable Document Format
Description:
Thesis
No Thumbnail Available
Name:
Form-17.pdf
Size:
99.34 KB
Format:
Adobe Portable Document Format
Description:
Form 17

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections