In this thesis, we present new ideas in cryptography, cryptanalysis and designing high-speed secure applications. We used the Advanced Encryption Standard (AES), to demonstrate the application of our proposals. In the field of cryptography, we propose new encryption models, while in the filed of cryptanalysis, we propose a secure key schedule for AES and developed new attacks that we applied on AES. We used our proposed models to design and develop new network encryption schemes and new modes of operations dedicated to disk encryption applications.
We propose five new encryption models. All the proposed models share a main idea, which is splitting the encryption key to a primary and a secondary key. The secondary key together with the primary key, are used to determine how the plaintext will be encrypted. The main functionality of the secondary key is to change the way the block cipher behaves, in other words by encrypting two identical plaintexts with the same primary key but two different secondary keys, the result will be two different ciphertexts. We have also presented the guidelines to use these models securely and the possibility to combine some of the proposed models with each other.
In order to increase the security of our proposed encryption models, we propose a generalized secure block cipher key schedule, using a secure cipher in the counter mode. This key schedule increases the block ciphers' resistance to related-key attacks, along with some other attacks. It also increases the complexity of the exhaustive key search attack. Additionally we propose new ideas that can improve some chosen plaintext, chosen ciphertext, chosen plaintext-adaptive chosen ciphertext and chosen ciphertext-adaptive chosen plaintext attacks. Using these new ideas, we managed to mount attacks on 5 and 6 rounds of AES, these attacks use the least amount of chosen plaintext in the literature.
To demonstrate the usage of our proposed encryption models in realistic scenarios, we developed new network encryption schemes and disk encryption modes of operations. In networking we constructed several secure network encryption schemes. We show, that these schemes allow a higher throughput than the current solutions. Furthermore these schemes require much lower memory, which increases the number of concurrent clients a server can serve. For the application in disk encryption we developed several new encryption modes of operations and also improved some of the current modes of operations. These new modes of operations offer a higher throughput in accessing disks than current solutions.
«
In this thesis, we present new ideas in cryptography, cryptanalysis and designing high-speed secure applications. We used the Advanced Encryption Standard (AES), to demonstrate the application of our proposals. In the field of cryptography, we propose new encryption models, while in the filed of cryptanalysis, we propose a secure key schedule for AES and developed new attacks that we applied on AES. We used our proposed models to design and develop new network encryption schemes and new modes of...
»