Matching Items (7)
Filtering by

Clear all filters

150895-Thumbnail Image.png
Description
Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged

Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged subscribers. Minimal Perfect Hash Families (PHFs) have been shown to provide a basis for the construction of memory-efficient t-resilient Key Pre-distribution Schemes (KPSs) from multiple instances of 1-resilient KPSs. Using this technique, the task of constructing a large t-resilient BES is reduced to finding a near-minimal PHF of appropriate parameters. While combinatorial and probabilistic constructions exist for minimal PHFs with certain parameters, the complexity of constructing them in general is currently unknown. This thesis introduces a new type of hash family, called a Scattering Hash Family (ScHF), which is designed to allow for the scalable and ingredient-independent design of memory-efficient BESs for large parameters, specifically resilience and total number of subscribers. A general BES construction using ScHFs is shown, which constructs t-resilient KPSs from other KPSs of any resilience ≤w≤t. In addition to demonstrating how ScHFs can be used to produce BESs , this thesis explores several ScHF construction techniques. The initial technique demonstrates a probabilistic, non-constructive proof of existence for ScHFs . This construction is then derandomized into a direct, polynomial time construction of near-minimal ScHFs using the method of conditional expectations. As an alternative approach to direct construction, representing ScHFs as a k-restriction problem allows for the indirect construction of ScHFs via randomized post-optimization. Using the methods defined, ScHFs are constructed and the parameters' effects on solution size are analyzed. For large strengths, constructive techniques lose significant performance, and as such, asymptotic analysis is performed using the non-constructive existential results. This work concludes with an analysis of the benefits and disadvantages of BESs based on the constructed ScHFs. Due to the novel nature of ScHFs, the results of this analysis are used as the foundation for an empirical comparison between ScHF-based and PHF-based BESs . The primary bases of comparison are construction efficiency, key material requirements, and message transmission overhead.
ContributorsO'Brien, Devon James (Author) / Colbourn, Charles J (Thesis advisor) / Bazzi, Rida (Committee member) / Richa, Andrea (Committee member) / Arizona State University (Publisher)
Created2012
153890-Thumbnail Image.png
Description
The recent flurry of security breaches have raised serious concerns about the security of data communication and storage. A promising way to enhance the security of the system is through physical root of trust, such as, through use of physical unclonable functions (PUF). PUF leverages the inherent randomness in physical

The recent flurry of security breaches have raised serious concerns about the security of data communication and storage. A promising way to enhance the security of the system is through physical root of trust, such as, through use of physical unclonable functions (PUF). PUF leverages the inherent randomness in physical systems to provide device specific authentication and encryption.

In this thesis, first the design of a highly reliable resistive random access memory (RRAM) PUF is presented. Compared to existing 1 cell/bit RRAM, here the sum of the read-out currents of multiple RRAM cells are used for generating one response bit. This method statistically minimizes any early-lifetime failure due to RRAM retention degradation at high temperature or under voltage stress. Using a device model that was calibrated using IMEC HfOx RRAM experimental data, it was shown that an 8 cells/bit architecture achieves 99.9999% reliability for a lifetime >10 years at 125℃ . Also, the hardware area overhead of the proposed 8 cells/bit RRAM PUF architecture was smaller than 1 cell/bit RRAM PUF that requires error correction coding to achieve the same reliability.

Next, a basic security primitive is presented, where the RRAM PUF is embedded in the cryptographic module, SHA-256. This architecture is referred to as Embedded PUF or EPUF. EPUF has a security advantage over SHA-256 as it never exposes the PUF response to the outside world. Instead, in each round, the PUF response is used to change a few bits of the message word to produce a unique message digest for each IC. The use of EPUF as a key generation module for AES is also shown. The hardware area requirement for SHA-256 and AES-128 is then analyzed using synthesis results based on TSMC 65nm library. It is shown that the area overhead of 8 cells/bit RRAM PUF is only 1.08% of the SHA-256 module and 0.04% of the AES-128 module. The security analysis of the PUF based systems is also presented. It is shown that the EPUF-based systems are resistant towards standard attacks on PUFs, and that the security of the cryptographic modules is not compromised.
ContributorsShrivastava, Ayush (Author) / Chakrabarti, Chaitali (Thesis advisor) / Yu, Shimeng (Committee member) / Cao, Yu (Committee member) / Arizona State University (Publisher)
Created2015
148348-Thumbnail Image.png
Description

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both parties perform random walks between supersingular elliptic curves on isogeny graphs of prime degree and eventually end at the same location, a shared secret.<br/><br/>This thesis seeks to explore some of the theory and concepts underlying the security of SIDH, especially as it relates to finding supersingular elliptic curves, generating isogeny graphs, and implementing SIDH. As elliptic curves and SIDH may be an unfamiliar topic to many readers, the paper begins by providing a brief introduction to elliptic curves, isogenies, and the SIDH Protocol. Next, the paper investigates more efficient methods of generating supersingular elliptic curves, which are important for visualizing the isogeny graphs in the algorithm and the setup of the protocol. Afterwards, the paper focuses on isogeny maps of various degrees, attempting to visualize isogeny maps similar to those used in SIDH. Finally, the paper looks at an implementation of SIDH in PARI/GP and work is done to see the effects of using isogenies of degree greater than 2 and 3 on the security, runtime, and practicality of the algorithm.

ContributorsSteele, Aaron J (Author) / Jones, John (Thesis director) / Childress, Nancy (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

A form of nanoscale steganography exists described as DNA origami cryptography which is a technique of secure information encryption through scaffold, staple, and varying docking strand self- assembling mixtures. The all-DNA steganography based origami was imaged through high-speed DNA-PAINT super-resolution imaging which uses periodic docking sequences to eliminate the need

A form of nanoscale steganography exists described as DNA origami cryptography which is a technique of secure information encryption through scaffold, staple, and varying docking strand self- assembling mixtures. The all-DNA steganography based origami was imaged through high-speed DNA-PAINT super-resolution imaging which uses periodic docking sequences to eliminate the need for protein binding. The purpose of this research was to improve upon the DNA origami cryptography protocol by encrypting information in 2D Rothemund Rectangular DNA Origami (RRO) and 3D cuboctahedron DNA origami as a platform of self-assembling DNA nanostructures to increase the routing possibilities of the scaffold. The initial focus of the work was increasing the incorporation efficiency of all individual docking spots for full 20nm grid RRO pattern readout. Due to this procedural optimization was pursued by altering annealing cycle length, centrifugal spin rates for purification, and lengthening docking strands vs. imager poly T linkers. A 14nm grid was explored as an intermediate prior to the 10nm grid for comparison of optimized experimental procedure for a higher density encryption pattern option. Imager concentration was discovered to be a vital determining factor in effectively resolving the 10nm grids due to high concentrations of imager strands inducing simultaneous blinking of adjacent docking strands to be more likely causing the 10nm grids to not be resolved. A 2 redundancy and 3 redundancy encryption scheme was developed for the 10nm grid RRO to be encrypted with. Further experimentation was completed to resolve full 10nm DNA-origami grids and encrypt with the message ”ASU”. The message was successfully encrypted and resolved through the high density 10nm grid with 2 and 3 redundancy patterns. A cuboctahedron 3D origami was explored with DNA-PAINT techniques as well resulting in successful resolution of the z-axis through variation of biotin linker length and calibration file. Positive results for short message ”0407” encryption of the cuboctahedron were achieved. Data encryption in DNA origami is further being explored and could be an optimal solution for higher density data storage with greater longevity of media.

ContributorsSukhareva, Daria (Author) / Hariadi, Rizal (Thesis director) / Sulc, Petr (Committee member) / Matthies, Michael (Committee member) / Barrett, The Honors College (Contributor) / School of Molecular Sciences (Contributor)
Created2023-05
131781-Thumbnail Image.png
Description
In the modern world with the ever growing importance of technology, the challenge of information security is of increasing importance. Cryptographic algorithms used to encode information stored and transmitted over the internet must be constantly improving as methodology and technology for cyber attacks improve. RSA and Elliptic Curve cryptosystems such

In the modern world with the ever growing importance of technology, the challenge of information security is of increasing importance. Cryptographic algorithms used to encode information stored and transmitted over the internet must be constantly improving as methodology and technology for cyber attacks improve. RSA and Elliptic Curve cryptosystems such as El Gamal or Diffie-Hellman key exchange are often used as secure asymmetric cryptographic algorithms. However, quantum computing threatens the security of these algorithms. A relatively new algorithm that is based on isogenies between elliptic curves has been proposed in response to this threat. The new algorithm is thought to be quantum resistant as it uses isogeny walks instead of point addition to generate a shared secret key. In this paper we will analyze this algorithm in an attempt to understand the theory behind it. A main goal is to create isogeny graphs to visualize degree 2 and 3 isogeny walks that can be taken between supersingular elliptic curves over small fields to get a better understanding of the workings and security of the algorithm.
ContributorsLoucks, Sara J (Author) / Jones, John (Thesis director) / Bremner, Andrew (Committee member) / Computer Science and Engineering Program (Contributor) / School of Film, Dance and Theatre (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131750-Thumbnail Image.png
Description
A one-way function (OWF) is a function that is computationally feasible to compute in one direction, but infeasible to invert. Many current cryptosystems make use of properties of OWFs to provide ways to send secure messages. This paper reviews some simple OWFs and examines their use in contemporary cryptosystems and

A one-way function (OWF) is a function that is computationally feasible to compute in one direction, but infeasible to invert. Many current cryptosystems make use of properties of OWFs to provide ways to send secure messages. This paper reviews some simple OWFs and examines their use in contemporary cryptosystems and other cryptographic applications. This paper also discusses the broader implications of OWF-based cryptography, including its relevance to fields such as complexity theory and quantum computing, and considers the importance of OWFs in future cryptographic development
ContributorsMcdowell, Jeremiah Tenney (Author) / Hines, Taylor (Thesis director) / Foy, Joseph (Committee member) / Sprung, Florian (Committee member) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131401-Thumbnail Image.png
Description
This thesis project is focused on studying the number field sieve. The number field sieve is a factoring algorithm which uses algebraic number theory and is one of the fastest known factoring algorithms today. Factoring large integers into prime factors is an extremely difficult problem, yet also extremely important in

This thesis project is focused on studying the number field sieve. The number field sieve is a factoring algorithm which uses algebraic number theory and is one of the fastest known factoring algorithms today. Factoring large integers into prime factors is an extremely difficult problem, yet also extremely important in cryptography. The security of the cryptosystem RSA is entirely based on the difficulty of factoring certain large integers into a product of two distinct large primes. While the number field sieve is one of the fastest factoring algorithms known, it is still not efficient enough to factor cryptographic sized integers.

In this thesis we will examine the algorithm of the number field sieve and discuss some important advancements. In particular, we will focus on the advancements that have been done in the polynomial selection step, the first main step of the number field sieve. The polynomial selected determines the number field by which computations are carried out in the remainder of the algorithm. Selection of a good polynomial allows for better time efficiency and a higher probability that the algorithm will be successful in factoring.
ContributorsLopez, Rose Eleanor (Co-author) / Lopez, Rose (Co-author) / Childress, Nancy (Thesis director) / Jones, John (Committee member) / Pomerance, Carl (Committee member) / School of Music (Contributor) / Department of Physics (Contributor) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05