The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed
in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and
access to the full text.
On the second hand, it deals with Ph.D. subjects
currently under investigation. This way, we provide a timely
map of contemporary research in cryptology.
All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.
R. Vimalathithan (#357)
Topic of his/her doctorate.
Cryptanalysis using Computational Intelligence
Year of completion
SECURITY ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS USING COMPUTATIONAL INTELLIGENCE FOR DEVELOPMENT
OF SECURED COMMUNICATION PROTOCOL IN WIRELESS SENSOR NETWORKS
Wireless Personal Area Network (WPAN) finds application in control system with safety application like nuclear plants. The issues in WPAN like security, authentication and message integrity and node capture are discussed. Considering these important issues, the research work done in my thesis develops a secured communication protocol for WPAN. To guarantee the security of the algorithm, various encryption algorithms are analyzed. If the encryption algorithm uses ‘n’ bit key then the search space is 2n. If the size of the key is large then the search space is also large. A powerful algorithm called Genetic Swarm Optimization which effectively reduces the key search space is proposed for analyzing the security of cryptographic algorithm. Using this GSO, the strength of various algorithms like, Knapsack cipher, Simplified DES, DES, Simplified AES, AES were analyzed. Analysis says that AES is highly secured.
Finally, a highly secured communication protocol is proposed for WPAN. AES algorithm for encryption and MAC is used for message authentication and integrity. Rolling code is used for message freshness which is generated by a NLFSR whose next sequence cannot be predicted. A polynomial based key distribution scheme is also proposed for WPAN, where the node can use single key for each transmission and make the protocol highly secured. Node capture impact is also derived for the polynomial based key distribution. For the proposed scheme NCI is zero, independent of the number of nodes that are captured or compromised. This confirms that the node can be placed even in unsecured environment. Any number of nodes can be introduced in the network without increasing the memory capacity and makes the network highly scalable.
This proposed scheme reduces the key access time and consumes limited amount of energy which is the required characteristic for low power sensor nodes. This proposed protocol provides high level of security and is suitable for WPAN.
athivimal (at) gmail.com