Provable Security in Idealised Models

dc.contributor.authorDhar, Chandranan
dc.date.accessioned2025-03-03T07:47:59Z
dc.date.available2025-03-03T07:47:59Z
dc.date.issued2024-07
dc.descriptionThis thesis is under the supervision of Prof.Mridul Nandien_US
dc.description.abstractThis thesis is a compilation of provable security analyses of various cryptographic constructions in idealised models. The first construction examined is the ABR hash. We revisit the existing proof of the ABR hash in the random oracle model and identify significant errors in the proof. Although we are unable to correct the original proof, we establish the security of the ABR tree of height 3 from scratch, addressing the first non-trivial case. As our second contribution, we conduct a tight and comprehensive security analysis of the Ascon AEAD mode in the random permutation model. We show that the efficiency of Ascon can be increased by 50%, and the tag size can be halved without losing any security. In the third contribution, we extend our security analysis of Ascon to the multiuser setting, providing tight security bounds for both nonce-respecting and noncemisuse adversaries. Additionally, we propose LK-Ascon, a variant of Ascon with a key size of up to 256 bits, offering improved multi-user security compared to Ascon. As the final contribution, we introduce PACT, a transform that converts any authenticated encryption mode into a context-committing one without any output length expansion. PACT achieves this with a single call to a collision-resistant unkeyed hash function and one call to a block cipher, with the analysis performed in the ideal cipher model. We also propose comPACT, a faster version of PACT which gives a nonce-respecting committing authenticated encryption scheme.en_US
dc.identifier.citation186p.en_US
dc.identifier.urihttp://hdl.handle.net/10263/7534
dc.language.isoenen_US
dc.publisherIndian Statistical Institute, Kolkataen_US
dc.relation.ispartofseriesISI Ph. D Thesis;TH635
dc.subjectProvable Securityen_US
dc.subjectSymmetric Cryptographyen_US
dc.subjectAuthenticated Encryptionen_US
dc.subjectHash Functionen_US
dc.subjectCommitting Securityen_US
dc.titleProvable Security in Idealised Modelsen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Thesis-Chandranan Dhar -28-2-25.pdf
Size:
2.1 MB
Format:
Adobe Portable Document Format
Description:
Thesis
No Thumbnail Available
Name:
Form 17-Chandranan Dhar -28-2-25.pdf
Size:
533.47 KB
Format:
Adobe Portable Document Format
Description:
Form 17

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections