Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/423709
Title: | An Efficient Cryptographic Technique Using Post Quantum Cryptography |
Researcher: | Dabra, Vivek |
Guide(s): | Bala, Anju and Kumari, Saru |
Keywords: | Computer Science Computer Science Information Systems Cryptography Engineering and Technology Post-quantum Cryptography Security Assistance Program |
University: | Thapar Institute of Engineering and Technology |
Completed Date: | 2022 |
Abstract: | Post-quantum cryptography (PQC) refers to the cryptographic techniques that are secure againstcryptanalyticattacksbyquantumcomputers. InPQC,lattice-basedcryptography(LBC) is the popular approach for designing public-key cryptographic techniques such as key exchange protocols, digital signature, and encryption techniques. The key exchange protocol is one of the basic cryptographic primitives of the Public Key Infrastructure (PKI). However, the literature about the study of key exchange protocols using lattice-based cryptography is limited, and often the schemes are studied independently. Therefore, a review of lattice-based key exchange protocols has been done in this work. Further, these protocols have been classiand#64257;ed undertwodifferentcategoriesdependingonthereconciliationmechanismusedbytheprotocol. From the comprehensive literature survey, it has been found that the key exchange protocols designed using LWE/RLWE problems of lattices are not secure if their public-private keys are reused. Due to key reuse, these key exchange protocols are vulnerable to signal leakage attack (SLA)andkeymismatchattack. Amongthesesignalleakageattacksisthemostsevere,andall the RLWE-based key exchange protocols are vulnerable to SLA attack. Therefore, an efand#64257;cient cryptographic key exchange technique that can resist signal leakage attack has been proposed. This key exchange technique has been proposed for different scenarios. These scenarios are described below as. Firstly, a new Lattice-based Anonymous Password Authenticated Key Exchange (LBAPAKE) protocol for mobile devices has been proposed. The proposed protocol resists the signal leakage attack and provides key reusability, anonymity, and perfect forward secrecy. Also, the formal security analysis of the proposed LBA-PAKE protocol has been done using the widely adopted Real-Or-Random (ROR) model. Further, the proposed LBA-PAKE protocol and Feng et al. s protocol have been implemented on the common mobile-server platform for the comparative performance analysis. |
Pagination: | 88p. |
URI: | http://hdl.handle.net/10603/423709 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 269.54 kB | Adobe PDF | View/Open Request a copy |
02_prelim pages.pdf | 1.44 MB | Adobe PDF | View/Open Request a copy | |
03_content.pdf | 63.66 kB | Adobe PDF | View/Open Request a copy | |
04_abstract.pdf | 68.52 kB | Adobe PDF | View/Open Request a copy | |
05_chapter 1.pdf | 601.85 kB | Adobe PDF | View/Open Request a copy | |
06_chapter 2.pdf | 3.24 MB | Adobe PDF | View/Open Request a copy | |
07_chapter 3.pdf | 242.21 kB | Adobe PDF | View/Open Request a copy | |
08_chapter 4.pdf | 156.73 kB | Adobe PDF | View/Open Request a copy | |
09_chapter 5.pdf | 221.72 kB | Adobe PDF | View/Open Request a copy | |
10_chapter 6.pdf | 51.17 kB | Adobe PDF | View/Open Request a copy | |
11_annexures.pdf | 92.55 kB | Adobe PDF | View/Open Request a copy | |
80_recommendation.pdf | 280.3 kB | Adobe PDF | View/Open Request a copy |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: