VTechWorks staff will be away for the winter holidays starting Tuesday, December 24, 2024, through Wednesday, January 1, 2025, and will not be replying to requests during this time. Thank you for your patience, and happy holidays!
 

Design Methods for Cryptanalysis

dc.contributor.authorJudge, Lyndon Virginiaen
dc.contributor.committeechairSchaumont, Patrick R.en
dc.contributor.committeememberAthanas, Peter M.en
dc.contributor.committeememberNazhandali, Leylaen
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:49:01Zen
dc.date.adate2013-01-24en
dc.date.available2014-03-14T20:49:01Zen
dc.date.issued2012-11-29en
dc.date.rdate2013-01-24en
dc.date.sdate2012-12-05en
dc.description.abstractSecurity of cryptographic algorithms relies on the computational difficulty of deriving the secret key using public information. Cryptanalysis, including logical and implementation attacks, plays an important role in allowing the security community to estimate their cost, based on the computational resources of an attacker. Practical implementations of cryptanalytic systems require complex designs that integrate multiple functional components with many parameters. In this thesis, methodologies are proposed to improve the design process of cryptanalytic systems and reduce the cost of design space exploration required for optimization. First, Bluespec, a rule-based HDL, is used to increase the abstraction level of hardware design and support efficient design space exploration. Bluespec is applied to implement a hardware-accelerated logical attack on ECC with optimized modular arithmetic components. The language features of Bluespec support exploration and this is demonstrated by applying Bluespec to investigate the speed area tradeoff resulting from various design parameters and demonstrating performance that is competitive with prior work. This work also proposes a testing environment for use in verifying the implementation attack resistance of secure systems. A modular design approach is used to provide separation between the device being tested and the test script, as well as portability, and openness. This yields an open-source solution that supports implementation attack testing independent of the system platform, implementation details, and type of attack under evaluation. The suitability of the proposed test environment for implementation attack vulnerability analysis is demonstrated by applying the environment to perform an implementation attack on AES. The design of complex cryptanalytic hardware can greatly benefit from better design methodologies and the results presented in this thesis advocate the importance of this aspect.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-12052012-105612en
dc.identifier.othervt_gsexam:41en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-12052012-105612/en
dc.identifier.urihttp://hdl.handle.net/10919/35980en
dc.publisherVirginia Techen
dc.relation.haspartJudge_LV_T_2012.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectImplementation attacken
dc.subjectDesign methoden
dc.subjectBluespecen
dc.subjectPrime field arithmeticen
dc.subjectPollard rhoen
dc.subjectElliptic curve cryptography (ECC)en
dc.subjectField programmable gate arraysen
dc.subjectHardware software co-designen
dc.subjectFault attacken
dc.subjectSide-channel analysis (SCA)en
dc.titleDesign Methods for Cryptanalysisen
dc.typeThesisen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Judge_LV_T_2012.pdf
Size:
2.13 MB
Format:
Adobe Portable Document Format

Collections