Analysis and synthesis of cryptographic Boolean functions in Haar domain /

Cryptographic Boolean functions serve as an integral part of symmetric-key ciphers. A strong cipher requires that the underlying functions meet specific security criteria. Traditionally, the Walsh transform and autocorrelation function of Boolean functions have been deployed as the main tools for st...

Full description

Saved in:
Bibliographic Details
Main Author: Rafiq, Hashum Mohamed (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Engineering, International Islamic University Malaysia, 2017
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5226
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 047770000a22003010004500
008 170606s2017 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 0 0 |a QA10.3 
100 1 |a Rafiq, Hashum Mohamed,  |e author 
245 1 |a Analysis and synthesis of cryptographic Boolean functions in Haar domain /  |c by Hashum Mohamed Rafiq 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Engineering, International Islamic University Malaysia,  |c 2017 
300 |a xxii, 316 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
347 |2 rdaft  |a text file  |b PDF 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2017. 
504 |a Includes bibliographical references (leaves 250-275). 
520 |a Cryptographic Boolean functions serve as an integral part of symmetric-key ciphers. A strong cipher requires that the underlying functions meet specific security criteria. Traditionally, the Walsh transform and autocorrelation function of Boolean functions have been deployed as the main tools for studying whether such functions meet the desired criteria. This thesis introduces the Haar transform as an alternative tool for studying cryptographic Boolean functions. The thesis presents Haar analysis and synthesis (construction) of cryptographically significant functions, including their related application specific designs. The study parallels with the earlier ones based on the Walsh domain approach. For the analysis part, the work begins by establishing the missing connections between the Haar, Walsh, and autocorrelation spectra. This stage presents new Haar representations of the Walsh-Paley transform and autocorrelation function, along with the related connection to the power spectrum. Using the Walsh analogy, the work then proceeds to derive the Haar based measures for the main cryptographic criteria including; Hamming distance and weight, balancedness, bentness, nonlinearity, correlation immunity, resiliency, strict-avalanche, global-avalanche and propagation criteria. The work presents the Haar general formulation and representation of all the stated criteria. The synthesis part is divided into two sub-parts related to testing and construction algorithms. The former introduces Haar based algorithms for testing and measuring main cryptographic criteria. The latter includes algorithms in two forms of Haar stochastic multistage search and Haar spectrum manipulation techniques. Both of these algorithms work on modifying bent functions to yield optimum functions with desired trade-off between criteria. This part also presents the simulation results of the Haar based algorithms in comparison to the existing benchmarks. The last part of the work involves deploying the synthesized functions for the design of S-boxes and combiner/filtering functions. A new design approach to S-boxes is presented along with its related experimental results for 4x4 and 6x4 mappings. For the 6x4 mapping, a set of 8 new DES-like S-boxes are selected and their security characteristics are compared to the existing benchmarks of DES and its improved variants. Additionally, the work proposes a new approach to the design of the underlying combiner/filtering functions. The simulation results demonstrate that the Haar based testing algorithms exhibit better computational complexity compared to their counterparts, possess the unique ability to quit the testing even when the spectrum is only processed partially, and their local zones' view allows for possible parallel and independent processing. Moreover, the construction algorithms have the flexibility to yield a single as well as a pool of cryptographically desired functions, and provide the lower variables' domain view in terms of the related sub-functions without leaving the current domain. The new designed S-boxes have shown improved security characteristics in terms of nonlinearity, differential characteristics, average probabilities and cross correlations. These methods allow for more design decision flexibility with an alternative local view that is not possible from the existing methods. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Engineering  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Engineering 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5226 
900 |a sbh-aaz-ls 
999 |c 440998  |d 472350 
952 |0 0  |6 T QA 000010.3 R136A 2017  |7 0  |8 THESES  |9 763482  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t QA 10.3 R136A 2017  |p 11100362175  |r 2018-11-09  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF QA 10.3 R136A 2017  |7 0  |8 THESES  |9 855953  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf QA 10.3 R136A 2017  |p 11100362176  |r 2018-11-09  |t 1  |v 0.00  |y THESISDIG