Hail Crypto!
There are two types of data : plain or &%^58$#@*
http://de.ci.phe.red



/Research

Things in the crypto-world that intrigue me.

ɦ

Hash Function Cryptanalysis

What if someone tampered with your special letter to Juliet? How would you ensure its integrity? Have no worry as you have your favorite cryptographic hash function to the rescue. So one must toil hard make it efficient and robust. While I am trying to be one of them. BTW all the best with Juliet :-)

Fault Analysis Attacks

What if there is a fault (While no one knows it could be injected by your roommate Mike) in the cryptosystem and your secret gift idea for Juliet is revealed? How would the system behave and adapt in such situations? This needs to addressed, right? While, I am trying to study the behavior of ciphers in the presence of faults. Hope together we can stop Mike and you can give that secret gift to Juliet on the next date.

δ

Higher-order Boolean Derivatives

While this topic is not directly related to me saving you and Juliet but nonetheless it is highly interesting. So lets hope I can study this very ineteresting topic and may be someday (probably by the time you and Juliet get married) contribute to make it more interesting.

/Publications

Dedicated to all Crypto-Lovers.


  • 2015

    SCOPE: On The Side-Channel Vulnerability of Releasing Unverified Plaintexts

    SAC 2015, Mount Allison University, Sackville, New Brunswick, Canada

    Dhiman Saha, Dipanwita Roy Chowdhury

    To Appear in Proceedings of the 22nd Conference on Selected Areas in Cryptography.

    Preventing Fault Attack using Fault Randomization with a case study on AES

    ACISP 2015, Brisbane, Australia

    Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury

    In Proceedings of the 20th Australasian Conference on Information Security and Privacy.

    Diagonal Fault Analysis of Grøstl in Dedicated MAC Mode

    HOST 2015, McLean, VA, USA

    Dhiman Saha, Dipanwita Roy Chowdhury

    In Proceedings of IEEE Int. Symposium on Hardware-Oriented Security and Trust.


  • 2014

    EscApe: Diagonal Fault Analysis of APE

    INDOCRYPT 2014, New Delhi, India

    Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury

    In Proceedings of 15th International Conference on Cryptology in India.

    Misuing Misuse-Resistance in APE

    DIAC 2014, Santa Barbara, USA

    Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury

    Presented at Directions in Authenticated Ciphers.

    CASH: Cellular Automata Based Parameterized Hash

    SPACE 2014, Pune, India.

    Sukhendu Kuila, Dhiman Saha, Dipanwita Roy Chowdhury

    In Proceedings of Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014.

    AEC: A Practical Scheme for Authentication with Error Correction

    SPACE 2014, Pune, India

    Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury

    In Proceedings of Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014.

    A Scalable Method for Constructing Non-linear Cellular Automata with Period $$2^n - 1$$

    ACRI 2014, Krakow, Poland.

    Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury

    In Proceedings of Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014.

    Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry.

    AFRICACRYPT 2014, Marrakesh, Morocco.

    Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury

    In Proceedings of 7th International Conference on Cryptology in Africa.


  • 2011

    PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology.

    INDOCRYPT 2011, Chennai, India.

    Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury

    In Proceedings of 12th International Conference on Cryptology in India.


  • 2009

    A Diagonal Fault Attack on the Advanced Encryption Standard.

    IACR Cryptology ePrint Archive 2009

    Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury


  • 2008

    Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures.

    INDOCRYPT 2008, Kharagpur, India.

    Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay

    In Proceedings of 9th International Conference on Cryptology in India


  • 2007

    Strengthening NLS Against Crossword Puzzle Attack.

    ACISP 2007, Townsville, Australia.

    Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury

    In Proceedings of 12th Australasian Conference.

  • When It
    All
    Started

/Sypher

Pages from the diary of a crypto-lover

My Team

The Cryptographer

The Photoholic

The Philosopher

Get de.ci.phe.red

Dhiman Saha

Crypto Research Lab
Room No. 308
Department of Computer Science & Engineering
IIT Kharagapur

E-mail : crypto(at)dhimans(dot)in