Meet the editor

Riccardo Bernardini graduated in Electrical Engineering from the University of Padova, Italy, in 1990. He spent the last year of his Ph.D. at the former AT&T Bell Labs (Murray Hill). After a postdoc period at the Ecole Polytechnique Federale de Lausanne (EPFL), he joined the University of Udine, Italy, as a professor. His research interests are diverse and include multidimensional signal processing, wavelets, filter banks, multimedia coding,

robust transmission, bio-engineering, chaotic systems, P2P streaming, and some security-related areas such as random number generation, physical unclonable functions, and embedding random permutations on chips. He has been involved in many projects (both regional and national), sometimes as a partner and sometimes as principal investigator/coordinator.

Contents

**Section 1**

and Elliptic Curve Pseudo Random

*by Menachem Domb*

*by Ahmed Drissi*

*by Orhun Kara*

**Section 2**

*by Bharadwaja V. Srividya and Smitha Sasi*

*by Adarsh Kumar and Deepak Kumar Sharma*

Tradeoff Attacks on Symmetric Ciphers

Security and Privacy of PUF-Based RFID Systems

**Preface XI**

New Techniques **1**

**Chapter 1 3**

**Chapter 2 23**

**Chapter 3 41**

Security Analysis **59**

**Chapter 4 61**

**Chapter 5 85**

**Chapter 6 109**

**Chapter 7 127**

Hybrid Encryption Model Based on Advanced Encryption Standard

*by Amal Hafsa, Mohamed Gafsi, Jihene Malek and Mohsen Machhout*

Advancements in Optical Data Transmission and Security Systems

Survey and Analysis of Lightweight Authentication Mechanisms

*by Ferucio Laurenţiu Ţiplea, Cristian Andriesei and Cristian Hristea*

The Security of Cryptosystems Based on Error-Correcting Codes

An Emphasis on Quantum Cryptography and Quantum Key Distribution

## Contents


Preface

Cryptography is an ancient science. According to Svetonio, more than 2000 years ago Julius Caesar encrypted his messages by shifting the alphabet by three positions, using what is today known as the *Caesar cipher* (Mary Stuart also used it). After 2000 years, we know much more about cryptography and cryptanalysis, and no one would use the Caesar cipher anymore (although it experienced a rebirth with the ROT13 masking procedure in the Usenet newsgroup); much more secure and diverse algorithms have been designed. The cryptography toolbox nowadays includes not only encryption algorithms but also hash functions, signature

protocols, zero-knowledge proofs, homomorphic encryption procedures, poker-by-

Nevertheless, despite 2000 years of history, cryptography research is still very active, pursuing solutions to several interesting (and difficult) problems such as identity-based cryptography, fully (and practical) homomorphic encryption, physically unclonable functions (for hardware authentication), cryptography based on quantum mechanics (e.g., key distribution via entanglement), and cryptography

Research in cryptography is expected to maintain its momentum in the future too, fueled by the still-increasing computational power and new needs like privacy and

This book is a snapshot of some recent results in this active field of research. It discusses quantum cryptography and quantum key distribution; lightweight protocols suited, for example, for the IoT; physical unclonable functions in the specific application of RFID systems; and security protocols based on optical

Cryptography does not only study how to hide information but it also studies how to recover encrypted information. This is cryptanalysis, the other side of cryptography, which is as important as cryptography itself. This book gives space to cryptanalysis as well, analyzing the security of cryptosystems based on error correction codes, discussing tradeoff attacks for symmetric ciphers, and analyzing

This book is not meant to be the final word on cryptography and cryptanalysis. It is

**Riccardo Bernardini** University of Udine – DPIA,

Udine, Italy

designed to provide readers with useful tools and spark new research ideas

phone protocols, and more.

robust against quantum computers.

the Internet of Things (IoT).

hybrid encryption models.

approach.
