Dissertations / Theses on the topic 'Algorithmes symétriques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'Algorithmes symétriques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Landry, Simon. "Étude de la résistance des algorithmes cryptographiques symétriques face à la cryptanalyse moderne." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS287.
Full textThe goal of this thesis is to contribute to the state-of-the-art by proposing new areas of research in order to secure cryptographic algorithms within an embedded device.Our main focal axis is organized around the countermeasure called threshold implementations which is known to be resistant against side-channel analysis attacks in the presence of glitches.These latter phenomenon occur randomly within an electronic circuit and lead to numerous attacks in cryptanalysis. We study the application of threshold implementations on symmetric-key cryptography.In a first phase, we participate to the cryptographic litterature by designing new threshold implementations easily applicable on a large variety of symmetric-key algorithms. Our countermeasures are provable mathematically secured against side-channel analysis attacks in the presence of glitches. In comparison with the recent publications of the state-of-the-art, we adress new issues and we assure similar or better performances. Therefore, our research has resulted in two patents within STMicroelectronics, thereby contributing to the industrial innovation process.In a second phase, we are interested in the study of the symmetric-key algorithm SM4 and its resistance against side-channel analysis attacks. The works obtained allow to centralize the proposed SM4 countermeasures against side-channel analysis attacks of the state-of-the-art and offer a visibility on the software performances of these constructions. We finally introduce the first threshold implementation of the SM4 algorithm. Our construction is provably mathematically resistant against side-channel analysis attacks in the presence of glitches
Koster, Jacobus. "Systèmes linéaires creux et non symétriques : résolution en parallèle et reordonnancement." Toulouse, INPT, 1997. http://www.theses.fr/1997INPT108H.
Full textVideau, Marion. "Critères de sécurité des algorithmes de chiffrement à clé secrète." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2005. http://tel.archives-ouvertes.fr/tel-00011927.
Full textalgorithmes de chiffrement à clé secrète et ont été menés suivant deux
axes. Le premier concerne la sécurité des chiffrements symétriques
itératifs par blocs contre les attaques par distingueur sur le dernier
tour. Les résultats portent en particulier sur la généralisation d'une
attaque différentielle d'ordre supérieur menée sur l'algorithme
MISTY1. L'origine de cette attaque ainsi que de sa généralisation a pu
être expliquée grâce aux propriétés du spectre de Walsh des fonctions
de non-linéarité maximale utilisées. Ainsi il a été possible
d'élaborer une attaque générique sur tous les chiffrements de Feistel
à cinq tours utilisant des fonctions dont le spectre de Walsh est
divisible par une grande puissance de 2 car cette propriété permet
d'obtenir une borne supérieure sur le degré de la composition de
telles fonctions, nettement plus faible que la borne
triviale. Cette attaque suggère ainsi un nouveau critère de sécurité
qui porte sur la divisibilité du spectre de Walsh des fonctions de
tour utilisées dans les chiffrements itératifs par blocs. La deuxième
partie de la thèse porte sur l'étude des fonctions booléennes
symétriques, et en particulier sur l'existence éventuelle de
propriétés cryptographiques. À partir d'une propriété structurelle de
périodicité d'une représentation d'une fonction booléenne symétrique,
les propriétés de degré algébrique, d'équilibre, de résilience, de
critère de propagation et de non-linéarité ont été étudiées, ce qui a
permis d'améliorer les résultats existants. Par ailleurs, le calcul
explicite du spectre de Walsh des fonctions booléennes symétriques de
degré 2 et 3 a été réalisé, ainsi que la détermination de toutes les
fonctions symétriques équilibrées de degré inférieur ou égal à 7,
indépendamment du nombre de variables.
Toumazet, Frédéric. "Algorithmes combinatoires pour le calcul des caractères de groupes non compacts intervenant en physique." Université de Marne-la-Vallée, 1999. http://www.theses.fr/1999MARN0077.
Full textLe, Trung Dung. "Contribution des moyens de production dispersés aux courants de défaut. Modélisation des moyens de production et algorithmes de détection de défaut." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0009/document.
Full textThis research focuses on the protection of MV distribution networks with Distributed Generators (DGs), such as wind farms or photovoltaic farms, etc. First, the state of art is carried out on fault behaviour of DGs, their impacts on protection system and the mitigation solutions. Next, algorithms are developed for directional relays without voltage sensors. Based on the symmetrical component method, these algorithms help the overcurrent protections to avoid the false tripping issue due to fault contribution of DGs. With the suppression of voltage sensors, such directional relays become cheaper in comparison with the traditional ones. Following the fault detection (the phase or residual current reaches the pick-up value) and depending on fault type (line-to-ground or line-to-line fault), the ratios between the variation (before and during fault) of negative-zero sequence or negative-positive sequence currents are calculated. From these ratios, a SVM (Support Vector Machines) classifier estimates the fault direction (upstream or downstream the detector). The classifier is trained beforehand from transient simulations. This survey shows good performances of the directional algorithms with different network parameters and different kinds of DGs. Such algorithms could be implemented in protections along the feeders in the future smart grids
Le, Pivert Xavier. "Développement de nouveaux algorithmes de protection et de localisation de défauts monophasés et biphasés pour les réseaux de distribution moyenne tension, basés sur les composantes symétriques et harmoniques des courants et des tensions." Paris 11, 2003. http://www.theses.fr/2003PA112147.
Full textThe medium voltage distribution networks are victims of faults which must be detected and eliminated as soon as possible, then more precisely localised in order to allow repairing staff to operate. This research work relates to the use of the symmetrical (homopolar, positive and onegative sequence) and harmonic components by protection and localization algorithms. A first theoretical part made it possible to highlight the properties of the symmetrical and harmonic decomposition of the voltage and current signals, and to calculate the components of the currents resulting from the various faults considered. The directional protection algorithms developed thereafter have as principal advantage of being able to work without voltage sensors in most configurations. Harmonic information, when it is available, leads to an improvement of the performances of these algorithms, without being really essential. The algorithms of localization developed require to function only the topological knowledge of the network and not that of the electric characteristics of each section. They also lead to a reduction in the number of sensors necessary. Their generalization leads us to a total system of applicable localization whatever the number and situation of the sensors. All these algorithms were tested and validated by simulation on a great number of configurations and cases. We thus clearly identified their limits and their performances. Two kind of neutral grounding were taken into account: resistive neutral and compensated neutral, like two types of fault : single-phase current and two-phase
Boussicault, Adrien. "Action du groupe symétrique sur certaines fractions rationnelles ; suivi de Puissances paires du Vandermonde." Phd thesis, Université Paris-Est, 2009. http://tel.archives-ouvertes.fr/tel-00502471.
Full textChaigneau, Colin. "Cryptanalyse des algorithmes de chiffrement symétrique." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLV086/document.
Full textNowadays, cryptology is heavily used to protect stored and transmitted data against malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the design of these algorithms, and cryptanalysis, the analysis of their security.In this thesis, we focus on the cryptanalysis of symmetric encryption algorithms, that is cryptographic algorithms that rely on a secret value shared beforehand between two parties to ensure both encryption and decryption. We present three attacks against symmetric encryption algorithms. The first two cryptanalyses target two high profile candidates of the CAESAR cryptographic competition, the AEZ and NORX algorithms, while the last one targets the Kravatte algorithm, an instance of the Farfalle construction based on the Keccak permutation. Farfalle is multipurpose a pseudo-random function (PRF) developed by the same designers' team as the permutation Keccak used in the SHA-3 hash function.The CAESAR competition, that began in 2015, aims at selecting a portfolio of algorithms recommended for authenticated encryption. The two candidates analysed, AEZ and NORX, reached the third round of the CAESAR competition but were not selected to be part of the finalists. These two results contributed to the cryptanalysis effort required in such a competition. This effort did not establish enough confidence to justify that AEZ and NORX accede to the final round of the competition.AEZ is a construction based on the AES primitive, that aims at offering an optimal resistance against more permissive attack scenarios than those usually considered for authenticated encryption algorithms. We show here that one can recover all the secret material used in AEZ with an abnormal success probability.NORX is an authenticated encryption algorithm based on a variant of the so-called sponge construction used for instance in the SHA-3 hash function. The internal permutation is inspired from the one of BLAKE and ChaCha. We show that one can leverage a strong structural property of this permutation to recover the secret key, thanks to the designers' non-conservative choice of reducing the security margin in the sponge construction.Finally, the last cryptanalysis reconsiders the robustness of the Kravatte algorithm. Kravatte is an efficient and parallelizable PRF with input and output of variable length. In this analysis, we exploit the low algebraic degree of the permutation Keccak used in Kravatte to mount three key-recovery attacks targeting different parts of the construction: a higher order differential attack, an algebraic meet-in-the-middle attack and an attack based on a linear recurrence distinguisher
Giraudo, Samuele. "Combinatoire algébrique des arbres." Phd thesis, Université Paris-Est, 2011. http://pastel.archives-ouvertes.fr/pastel-00674619.
Full textGouget, Aline. "Etude de propriétés cryptographiques des fonctions booléennes et algorithme de confusion pour le chiffrement symétrique." Caen, 2004. http://www.theses.fr/2004CAEN2023.
Full textPopa, Sorin. "Algorithme de contact quasi-symétrique et conditions aux limites répétitives pour la simulation tridimensionnelle du forgeage." Phd thesis, École Nationale Supérieure des Mines de Paris, 2005. http://pastel.archives-ouvertes.fr/pastel-00002047.
Full textIvey, law Hamish. "Algorithmic aspects of hyperelliptic curves and their jacobians." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4084/document.
Full textThe contribution of this thesis is divided naturally into two parts. In Part I we generalise the work of Khuri-Makdisi (2004) on algorithms for divisor arithmetic on curves over fields to more general bases. We prove that the natural analogues of the results of Khuri-Makdisi continue to hold for relative effective Cartier divisors on projective schemes which are smooth of relative dimension one over an arbitrary affine Noetherian base scheme and that natural analogues of the algorithms remain valid in this context for a certain class of base rings. We introduce a formalism for such rings,which are characterised by the existence of a certain subset of the usual linear algebra operations for projective modules over these rings.Part II of this thesis is concerned with a type of Riemann-Roch problem for divisors on certain algebraic surfaces. Specifically we consider algebraic surfaces arising as the square or the symmetric square of a hyperelliptic curve of genus at least two over an (almost) arbitrary field. The main results are a decomposition of the spaces of global sections of certain divisors on such surfaces and explicit formulæ for the dimensions of the spaces of sections of these divisors. In the final chapter we present an algorithm which generates a basis for the space of global sections of such a divisor
Gérard, Benoît. "Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00577229.
Full textAzzaz, Mohamed Salah. "Implantation paramétrable d'un nouvel algorithme de cryptage symétrique basé Chaos par inclusion au sein d'une architecture reconfigurable de type FPGA." Thesis, Université de Lorraine, 2012. http://www.theses.fr/2012LORR0385.
Full textSince 1980, the idea of using dynamic systems with chaotic behaviour for the design of encryption/decryption algorithms has attracted increasing: attention from researchers. The strong dynamics of chaotic systems such as sensitivity to initial conditions and control parameters, the unpredictability in the long term and broad-spectrum can provide important properties such as confusion and diffusion usually meet in standard cryptography. In addition, there are two possible approaches for designing chaos-based cryptosystems: analog and digital. Analog encryption techniques are primarily based on chaos-synchronization, while the chaotic digital encryption approaches do not depend on the chaos-synchronization and can be implemented either in software or hardware. This thesis focuses on the digital design and implementation of a new cryptosystem based on chaos-synchronization. The discovery of the possibility of chaos synchronization in 1990 opens the door to investigation digital chaos-based encryption. Indeed, many contributions are made for many promising achievements of digital cryptosystems. However, a number of recently proposed digital chaotic ciphers have been shown that they are not secure enough and they are cryptanalyzed. In addition, in order to design more secure digital chaotic ciphers and meet the security requirements in embedded systems, rules and new mechanisms must be carefully considered to make up the flaws in the design flow. However, the problem of the degradation dynamics of chaotic systems has not been seriously considered by most designers of digital chaotic ciphers. Furthermore, most all the digital chaos-based cryptosystems proposed in the literature does not address the issue of real-time embedded applications. Consequently, the tasks of these thesis works focus on the design solutions providing the real secure suitable for embedded applications. Our contributions in this thesis are, firstly the design and hardware implementation on reconfigurable FPGA technology of a pseudo-random key generator based on chaotic systems (continuous and discrete). Secondly, the statistical analysis detailed security of the proposed generators. Thirdly, the development, the conception and the integration of a new chaotic generator in a symmetric stream cipher, includes the resolution problem of the chaos synchronization between the transmitter (encryption) and receiver (decryption). Fourthly, the hardware implementation of the proposed cryptosystem on real encryption applications. i.e. the encryption/decryption of real-time audio, image and video data. In addition, a performance evaluation and comparisons with previous conventional and chaos-based ciphers is performed in order to extract these weaknesses and strengths and define future work prospects
Roche, Thomas. "Dimensionnement et intégration d'un chiffre symétrique dans le contexte d'un système d'information distribué de grande taille." Phd thesis, Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00452399.
Full textSchrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Full textModern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algorithms with lower complexities than the conjectural bounds.With the advent of quantum computing devices, these levels of security have to be updated to take a whole new notion of algorithms into account. At the same time, cryptography is becoming widely used in small devices (smart cards, sensors), with new cost constraints.In this thesis, we study the security of secret-key cryptosystems against quantum adversaries.We first build new quantum algorithms for k-list (k-XOR or k-SUM) problems, by composing exhaustive search procedures. Next, we present dedicated cryptanalysis results, starting with a new quantum cryptanalysis tool, the offline Simon's algorithm. We describe new attacks against the lightweight algorithms Spook and Gimli and we perform the first quantum security analysis of the standard cipher AES.Finally, we specify Saturnin, a family of lightweight cryptosystems oriented towards post-quantum security. Thanks to a very similar structure, its security relies largely on the analysis of AES
Bonnetain, Xavier. "Hidden Structures and Quantum Cryptanalysis." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS181.
Full textIn this thesis, we study the security of cryptographic systems against an adversary who has access to a quantum computer. In quantum computing, we studied the hidden period and hidden shift problems, which are among the few known problems that have some applications in cryptogaphy and for which the best known quantum algorithm is more than polynomially faster than the best known classical algorithm. We proposed some improvements, new tradeoffs between classical and quantum time and memory, and extended their scope of applications to cases where only a classical oracle is available. In cryptanalysis, in symmetric cryptography, we proposed some attacks against symmetric constructions based on hidden shifts, and generalized many attacks using hidden periods to cases where the construction is only accessible classically. We proposed a quantum cryptanalysis of the different versions of the authenticated cipher AEZ and some quantum versions of multiple slide attacks, which are a classical family of cryptanalyses. This rewriting of attacks in the formalism of hidden periods has allowed us to propose a new classical attack against multiple variants of the cipher MiMC. In asymmetric cryptography, we proposed a concrete and asymptotic quantum security analysis of some isogeny-based key exchanges. Finally, we studied quantum security in some cases where these hidden structure problems do not apply, with in particular the first quantum security analysis of AES, the most used symmetric cipher to date
Payen, Gérard. "Contribution à l'étude des régimes d'écoulement à faible nombre de Reynolds au travers d'expansions symétriques par simulations numériques instationnaires basées sur une méthode de Random Vortex hybride." Rouen, 1991. http://www.theses.fr/1991ROUES017.
Full textTisseur, Françoise. "Méthodes numériques pour le calcul d'éléments spectraux : étude de la précision, la stabilité et la parallélisation." Saint-Etienne, 1997. http://www.theses.fr/1997STET4006.
Full textSadik, Mohamed. "Inégalités de Markov-Bernstein en L2 : les outils mathématiques d'encadrement de la constante de Markov-Bernstein." Phd thesis, INSA de Rouen, 2010. http://tel.archives-ouvertes.fr/tel-00557914.
Full textCogliati, Benoît-Michel. "Le schéma d'Even-Mansour paramétrable : preuves de sécurité à l'aide de la technique des coefficients H." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV064/document.
Full textTweakable block ciphers are a generalization of classical block ciphers which, in addition to a key and a plaintext or a ciphertext, take an additionnal parameter called a tweak. The goal of this new parameter is to bring variability to the block cipher without needing to change the key or to keep the tweak secret. The tweak should also be adversariallycontrollable without sacrificing security. In this thesis we study a particular class of block ciphers, namely key-alternating ciphers. More precisely, we study the security of the Even-Mansour scheme, which is an abstraction of these ciphers in the random permutation model, and seek to bring tweakability to this scheme while keeping strong security guarantees. To this end, we introduce a new generic construction, dubbed TEM, which replaces the round keys from the Even-Mansour construction by a value depending on both the key and the tweak, and study its security in two cases: when the tweak and key mixing is linear or highly non-linear. Our security proofs rely on the H-coefficients technique, a technique introduced by Jacques Patarin in his PhD thesis which transforms cryptographic problems into combinatorial problems in finite groups
Guidara, Rima. "Méthodes markoviennes pour la séparation aveugle de signaux et images." Toulouse 3, 2009. http://thesesups.ups-tlse.fr/705/.
Full textThis thesis presents new Markovian methods for blind separation of instantaneous linear mixtures of one-dimensional signals and images. In the first part, we propose several improvements to an existent method for separating temporal signals. The new method exploits simultaneously non-Gaussianity, autocorrelation and non-stationarity of the sources. Excellent performance is obtained for the separation of artificial mixtures of speech signals, and we succeed to separate real mixtures of astrophysical spectra. An extension to image separation is then proposed. The dependence within the image pixels is modelled by non-symetrical half-plane Markov random fields. Very good performance is obtained for the separation of artificial mixtures of natural images and noiseless observations of the Planck satellite. The results obtained with a low level noise are acceptable
Côté, Hugo. "Programmes de branchement catalytiques : algorithmes et applications." Thèse, 2018. http://hdl.handle.net/1866/22123.
Full text