Statistical Model of the Statistical Saturation Attack
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Nyberg, Kaisa | |
dc.contributor.author | Khan, Md | |
dc.contributor.school | Perustieteiden korkeakoulu | fi |
dc.contributor.supervisor | Nyberg, Kaisa | |
dc.date.accessioned | 2015-06-23T11:16:50Z | |
dc.date.available | 2015-06-23T11:16:50Z | |
dc.date.issued | 2015-06-10 | |
dc.description.abstract | The statistical saturation attack (SSA) introduced by Collard and Standaert focuses on the non-uniformity of certain bits in the ciphertext space by fixing certain bits in the plaintext space. It exploits this non-uniformity by distinguishing an observed distribution among two known distributions: one is uniform and the other is non-uniform. To do so, a statistical test, based on a statistical distinguisher is required. There exists such statistical distinguishers based on the links in between SSA and other statistical cryptanalytic techniques. Instead of using such links, in this thesis we look directly in SSA and develop a statistical distinguisher and propose a statistical test based on this distinguisher. The statistical distinguisher denoted by T is primarily chi-square distributed. Theoretical approximation of the distribution of T is derived in terms of the size and capacity of the distribution considering both of the cases of a single fixation and a set of fixations. The developed model is applied on SMALLPRESENT-[4] for the case of single fixation and the evolution of the distinguisher is observed both theoretically and experimentally as the number of encrypted plaintexts increases. In addition to this, a connection between the error probability of the statistical test and the number of required plaintexts (in other words data complexity) is also presented and showed that this theoretical data complexity is in close correspondence to the observed data complexity in the experiments on SMALLPRESENT-[4]. | en |
dc.format.extent | 77 + 0 | |
dc.format.mimetype | application/pdf | en |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/16744 | |
dc.identifier.urn | URN:NBN:fi:aalto-201506303568 | |
dc.language.iso | en | en |
dc.programme | Master’s Programme in Foundations of Advanced Computing (FAdCo) | fi |
dc.programme.major | Foundations of Advanced Computing | fi |
dc.programme.mcode | SCI3014 | fi |
dc.rights.accesslevel | openAccess | |
dc.subject.keyword | statistical | en |
dc.subject.keyword | cryptanalysis | en |
dc.subject.keyword | SSA | en |
dc.subject.keyword | model | en |
dc.subject.keyword | distinguishing | en |
dc.subject.keyword | complexity | en |
dc.title | Statistical Model of the Statistical Saturation Attack | en |
dc.type | G2 Pro gradu, diplomityö | en |
dc.type.okm | G2 Pro gradu, diplomityö | |
dc.type.ontasot | Master's thesis | en |
dc.type.ontasot | Diplomityö | fi |
dc.type.publication | masterThesis | |
local.aalto.idinssi | 51984 | |
local.aalto.openaccess | yes |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- master_Khan_Md_2015.pdf
- Size:
- 3.03 MB
- Format:
- Adobe Portable Document Format