Please use this identifier to cite or link to this item:
Title: An Efficient Cryptographic Technique Using Post-Quantum Cryptography
Authors: Dabra, Vivek
Supervisor: Bala, Anju
Kumari, Saru
Keywords: Security;Cryptographic Analysis
Issue Date: 14-Jun-2022
Abstract: Post-quantum cryptography (PQC) refers to the cryptographic techniques that are secure againstcryptanalyticattacksbyquantumcomputers. InPQC,lattice-basedcryptography(LBC) is the popular approach for designing public-key cryptographic techniques such as key exchange protocols, digital signature, and encryption techniques. The key exchange protocol is one of the basic cryptographic primitives of the Public Key Infrastructure (PKI). However, the literature about the study of key exchange protocols using lattice-based cryptography is limited, and often the schemes are studied independently. Therefore, a review of lattice-based key exchange protocols has been done in this work. Further, these protocols have been classified undertwodifferentcategoriesdependingonthereconciliationmechanismusedbytheprotocol. From the comprehensive literature survey, it has been found that the key exchange protocols designed using LWE/RLWE problems of lattices are not secure if their public-private keys are reused. Due to key reuse, these key exchange protocols are vulnerable to signal leakage attack (SLA)andkeymismatchattack. Amongthesesignalleakageattacksisthemostsevere,andall the RLWE-based key exchange protocols are vulnerable to SLA attack. Therefore, an efficient cryptographic key exchange technique that can resist signal leakage attack has been proposed. This key exchange technique has been proposed for different scenarios. These scenarios are described below as. Firstly, a new Lattice-based Anonymous Password Authenticated Key Exchange (LBAPAKE) protocol for mobile devices has been proposed. The proposed protocol resists the signal leakage attack and provides key reusability, anonymity, and perfect forward secrecy. Also, the formal security analysis of the proposed LBA-PAKE protocol has been done using the widely adopted Real-Or-Random (ROR) model. Further, the proposed LBA-PAKE protocol and Feng et al.’s protocol have been implemented on the common mobile-server platform for the comparative performance analysis. The experimental results show that the proposed LBAPAKE protocol is as efficient as Feng et al.’s protocol with an extra shield of security. Next, the modified two-party authenticated key agreement (m-2PAKA) protocol for post-quantum world has been proposed
Description: NA
Appears in Collections:Doctoral Theses@CSED

Files in This Item:
File Description SizeFormat 
Vivek_Dabra_Thesis.pdf5.51 MBAdobe PDFView/Open    Request a copy

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.