Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/77253
Title: Konstruksi Kelas Kunci Lemah pada Kriptosistem IDEA Berdasarkan Faktor Linear dan Kriptanalisis Diferensial
Authors: Guritman, Sugi
Silalahi, Paruhum
Taufik, Ghofar
Issue Date: 2015
Publisher: IPB (Bogor Agricultural University)
Abstract: Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In cryptography, a common way to secure information or document is to disguise the message you want to send a different message, then the message will be seen by those who have the authority to make the process of reversal of messages that have been disguised. The information disguises process known as cryptosystems. Cryptosystem divided into two parts : symmetric and asymmetric cryptosystems. In this thesis we study cryptanalysis of IDEA (International Data Encryption Algorithm). IDEA algorithm is an algorithm that operates with a block size of 64 bits by using the same key size of 128 bits. This algorithm uses mixed operations are multiplication modulo operation (216 + 1), addition modulo operation (216) and bitwise XOR. In this study is conducted a theoretical study relating to the construction of a weak key classes on IDEA cryptosystems and affirmation of the tables that have been created by Daemen. The construction of a weak key classes is based on linear factor and differential cryptanalysis. There are three objectives of this study, namely: (1) to assess proposition associated with the construction of a weak key classes on IDEA cryptosystems, (2) to construct a weak key classes based on factor linear and differential cryptanalysis, (3) to recover weak keys in IDEA cryptosystems. The construction of the weak key classes based on linear factor resulting global linear equations that are used to lower the chances of recovery of the bits that are not known yet. While the construction of the weak key classes based on differential cryptanalysis where at the seventh round was not required to produce a weak key class 266
URI: http://repository.ipb.ac.id/handle/123456789/77253
Appears in Collections:MT - Mathematics and Natural Science

Files in This Item:
File SizeFormat 
2015gta.pdf
  Restricted Access
11.1 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.