dc.rights.license | In Copyright | en_US |
dc.creator | Acharya, Bipeen | |
dc.date.accessioned | 2015-07-29T19:59:08Z | |
dc.date.available | 2015-07-29T19:59:08Z | |
dc.date.created | 2015 | |
dc.identifier | WLURG38_Acharya_MATH_2015 | |
dc.identifier.uri | http://hdl.handle.net/11021/32169 | |
dc.description | Thesis; [FULL-TEXT FREELY AVAILABLE ONLINE] | en_US |
dc.description | Bipeen Acharya is a member of the Class of 2015 of Washington and Lee University. | en_US |
dc.description.abstract | The increasing scale of the Internet of Things exposes the proprietors and users to a number of security threats in terms of invasion of privacy, identity thefts and the like. It is therefore absolutely necessary that the Internet of Things be secure so that communications between these computing devices can happen undisturbed by any illegitimate third party. Lightweight cryptography has emerged as one of the best solutions to make the communication secure. Cryptanalysis of a cipher is important to measure and evaluate the strength of a cipher. In this thesis, I explain in detail the process of linear cryptanalysis on a Substitution Permutation Network of 4 rounds. I provide an in-depth background of all key concepts and ideas to make this paper accessible to all kinds of readers. I also provide an open-source Python implementation of the linear cryptanalysis, which can be easily customized and expanded to perform stronger cryptanalysis or to extend to other cryptanalysis techniques. This paper provides a sound framework on linear cryptanalysis, which can be built upon for further research on cryptanalysis techniques. | en_US |
dc.format.extent | 37 pages | en_US |
dc.language.iso | en_US | en_US |
dc.rights | This material is made available for use in research, teaching, and private study, pursuant to U.S. Copyright law. The user assumes full responsibility for any use of the materials, including but not limited to, infringement of copyright and publication rights of reproduced materials. Any materials used should be fully credited with the source. | en_US |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en_US |
dc.subject.other | Washington and Lee University -- Honors in Mathematics | en_US |
dc.title | Towards an Automated and Customizable Linear Cryptanalysis of Substitution-Permutation Network Cipher (thesis) | en_US |
dc.type | Text | en_US |
dcterms.isPartOf | RG38 - Student Papers | |
dc.rights.holder | Acharya, Bipeen | |
dc.subject.fast | Data encryption (Computer science) | en_US |
dc.subject.fast | Internet -- Security measures | en_US |
dc.subject.fast | Cryptography | en_US |
dc.subject.fast | Online identity theft | en_US |
local.department | Mathematics | en_US |
local.scholarshiptype | Honors Thesis | en_US |