An Efficient Cryptographic Technique Using Post-Quantum Cryptography

dc.contributor.authorDabra, Vivek
dc.contributor.supervisorBala, Anju
dc.contributor.supervisorKumari, Saru
dc.date.accessioned2022-06-14T11:39:46Z
dc.date.available2022-06-14T11:39:46Z
dc.date.issued2022-06-14
dc.descriptionNAen_US
dc.description.abstractPost-quantum cryptography (PQC) refers to the cryptographic techniques that are secure againstcryptanalyticattacksbyquantumcomputers. InPQC,lattice-basedcryptography(LBC) is the popular approach for designing public-key cryptographic techniques such as key exchange protocols, digital signature, and encryption techniques. The key exchange protocol is one of the basic cryptographic primitives of the Public Key Infrastructure (PKI). However, the literature about the study of key exchange protocols using lattice-based cryptography is limited, and often the schemes are studied independently. Therefore, a review of lattice-based key exchange protocols has been done in this work. Further, these protocols have been classified undertwodifferentcategoriesdependingonthereconciliationmechanismusedbytheprotocol. From the comprehensive literature survey, it has been found that the key exchange protocols designed using LWE/RLWE problems of lattices are not secure if their public-private keys are reused. Due to key reuse, these key exchange protocols are vulnerable to signal leakage attack (SLA)andkeymismatchattack. Amongthesesignalleakageattacksisthemostsevere,andall the RLWE-based key exchange protocols are vulnerable to SLA attack. Therefore, an efficient cryptographic key exchange technique that can resist signal leakage attack has been proposed. This key exchange technique has been proposed for different scenarios. These scenarios are described below as. Firstly, a new Lattice-based Anonymous Password Authenticated Key Exchange (LBAPAKE) protocol for mobile devices has been proposed. The proposed protocol resists the signal leakage attack and provides key reusability, anonymity, and perfect forward secrecy. Also, the formal security analysis of the proposed LBA-PAKE protocol has been done using the widely adopted Real-Or-Random (ROR) model. Further, the proposed LBA-PAKE protocol and Feng et al.’s protocol have been implemented on the common mobile-server platform for the comparative performance analysis. The experimental results show that the proposed LBAPAKE protocol is as efficient as Feng et al.’s protocol with an extra shield of security. Next, the modified two-party authenticated key agreement (m-2PAKA) protocol for post-quantum world has been proposeden_US
dc.description.sponsorshipNAen_US
dc.identifier.urihttp://hdl.handle.net/10266/6228
dc.language.isoenen_US
dc.subjectSecurityen_US
dc.subjectCryptographic Analysisen_US
dc.titleAn Efficient Cryptographic Technique Using Post-Quantum Cryptographyen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Vivek_Dabra_Thesis.pdf
Size:
5.38 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.03 KB
Format:
Item-specific license agreed upon to submission
Description: