Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/423709
Title: An Efficient Cryptographic Technique Using Post Quantum Cryptography
Researcher: Dabra, Vivek
Guide(s): Bala, Anju and Kumari, Saru
Keywords: Computer Science
Computer Science Information Systems
Cryptography
Engineering and Technology
Post-quantum Cryptography
Security Assistance Program
University: Thapar Institute of Engineering and Technology
Completed Date: 2022
Abstract: Post-quantum cryptography (PQC) refers to the cryptographic techniques that are secure againstcryptanalyticattacksbyquantumcomputers. InPQC,lattice-basedcryptography(LBC) is the popular approach for designing public-key cryptographic techniques such as key exchange protocols, digital signature, and encryption techniques. The key exchange protocol is one of the basic cryptographic primitives of the Public Key Infrastructure (PKI). However, the literature about the study of key exchange protocols using lattice-based cryptography is limited, and often the schemes are studied independently. Therefore, a review of lattice-based key exchange protocols has been done in this work. Further, these protocols have been classiand#64257;ed undertwodifferentcategoriesdependingonthereconciliationmechanismusedbytheprotocol. From the comprehensive literature survey, it has been found that the key exchange protocols designed using LWE/RLWE problems of lattices are not secure if their public-private keys are reused. Due to key reuse, these key exchange protocols are vulnerable to signal leakage attack (SLA)andkeymismatchattack. Amongthesesignalleakageattacksisthemostsevere,andall the RLWE-based key exchange protocols are vulnerable to SLA attack. Therefore, an efand#64257;cient cryptographic key exchange technique that can resist signal leakage attack has been proposed. This key exchange technique has been proposed for different scenarios. These scenarios are described below as. Firstly, a new Lattice-based Anonymous Password Authenticated Key Exchange (LBAPAKE) protocol for mobile devices has been proposed. The proposed protocol resists the signal leakage attack and provides key reusability, anonymity, and perfect forward secrecy. Also, the formal security analysis of the proposed LBA-PAKE protocol has been done using the widely adopted Real-Or-Random (ROR) model. Further, the proposed LBA-PAKE protocol and Feng et al. s protocol have been implemented on the common mobile-server platform for the comparative performance analysis.
Pagination: 88p.
URI: http://hdl.handle.net/10603/423709
Appears in Departments:Department of Computer Science and Engineering

Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: