Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meltem Sönmez Turan is active.

Publication


Featured researches published by Meltem Sönmez Turan.


australasian conference on information security and privacy | 2013

A Chosen IV Related Key Attack on Grain-128a

Subhadeep Banik; Subhamoy Maitra; Santanu Sarkar; Meltem Sönmez Turan

Due to the symmetric padding used in the stream cipher Grain v1 and Grain-128, it is possible to find Key-IV pairs that generate shifted keystreams efficiently. Based on this observation, Lee et al. presented a chosen IV related Key attack on Grain v1 and Grain-128 at ACISP 2008. Later, the designers introduced Grain-128a having an asymmetric padding. As a result, the existing idea of chosen IV related Key attack does not work on this new design. In this paper, we present a Key recovery attack on Grain-128a, in a chosen IV related Key setting. We show that using around γ·232 (γ is a experimentally determined constant and it is sufficient to estimate it as 28) related Keys and γ·264 chosen IVs, it is possible to obtain 32·γ simple nonlinear equations and solve them to recover the Secret Key in Grain-128a.


IACR Cryptology ePrint Archive | 2014

The Multiplicative Complexity of Boolean Functions on Four and Five Variables

Meltem Sönmez Turan; Rene C. Peralta

A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4\(\,\times \,\)4 S-boxes and use these iteratively (e.g., PRESENT [1] and SPONGENT [2]). In order to efficiently implement the primitive, efficient implementations of its internal components are needed. Multiplicative complexity of a function is the minimum number of AND gates required to implement it by a circuit over the basis (AND, XOR, NOT). It is known that multiplicative complexity is exponential in the number of input bits \(n\). Thus it came as a surprise that circuits for all \(65 536\) functions on four bits were found which used at most three AND gates [3]. In this paper, we verify this result and extend it to five-variable Boolean functions. We show that the multiplicative complexity of a Boolean function with five variables is at most four.


international conference on progress in cryptology | 2010

Message recovery and pseudo-preimage attacks on the compression function of Hamsi-256

Çağdaş Çalık; Meltem Sönmez Turan

Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function. Then, we present a message recovery attack with a complexity of 210.48 compression function evaluations. Also, we present a pseudo-preimage attack for the compression function with complexity 2254.25.


Cryptography and Communications | 2012

On the nonlinearity of maximum-length NFSR feedbacks

Meltem Sönmez Turan

Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based designs do not offer the desired security levels. In the last decade, using Nonlinear Feedback Shift Registers (NFSRs) in stream ciphers became very popular. However, the theory of NFSRs is not well-understood, and there is no efficient method that constructs a cryptographically strong feedback function and also, given a feedback function it is hard to predict the period. In this paper, we study the maximum-length NFSRs, focusing on the nonlinearity of their feedback functions. First, we provide some upper bounds on the nonlinearity of the maximum-length feedback functions, and then we study the feedback functions having nonlinearity 2 in detail. We also show some techniques to improve the nonlinearity of a given feedback function using cross-joining.Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based designs do not offer the desired security levels. In the last decade, using Nonlinear Feedback Shift Registers (NFSRs) in stream ciphers became very popular. However, the theory of NFSRs is not well-understood, and there is no efficient method that constructs a cryptographically strong feedback function and also, given a feedback function it is hard to predict the period. In this paper, we study the maximum-length NFSRs, focusing on the nonlinearity of their feedback functions. First, we provide some upper bounds on the nonlinearity of the maximum-length feedback functions, and then we study the feedback functions having nonlinearity 2 in detail. We also show some techniques to improve the nonlinearity of a given feedback function using cross-joining.


security and artificial intelligence | 2011

Evolutionary construction of de bruijn sequences

Meltem Sönmez Turan

A binary de Bruijn sequence of order n is a cyclic sequence of period 2n, in which each n-bit pattern appears exactly once. These sequences are commonly used in random number generation and symmetric key cryptography particularly in stream cipher design, mainly due to their good statistical properties. Constructing de Bruijn sequences is of interest and well studied in the literature. In this study, we propose a new randomized construction method based on genetic algorithms. The method models de Bruijn sequences as a special type of traveling salesman tours and tries to find optimal solutions to this special type of the traveling salesman problem (TSP). We present some experimental results for n d 14.


international conference on cryptology in india | 2010

Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing

Meltem Sönmez Turan; Erdener Uyan

A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only a small number of bits. In this study, we use hill climbing methods to evaluate the near-collision resistance of some of the second round SHA-3 candidates. We practically obtained (i) 184/256-bit near-collision for the 2-round compression function of Blake-32; (ii) 192/256-bit near-collision for the 2-round compression function of Hamsi-256; (iii) 820/1024-bit near-collisions for 10-round compression function of JH. Among the 130 possible reduced variants of Fugue-256, we practically observed collisions for 7 variants (e.g. (k,r,t) = (1,2,5)) and near-collisions for 26 variants (e.g. 234/256 bit near-collision for (k,r,t) = (2,1,8)).


cryptographic hardware and embedded systems | 2015

Predictive Models for Min-Entropy Estimation

John Kelsey; Kerry A. McKay; Meltem Sönmez Turan

Random numbers are essential for cryptography. In most real-world systems, these values come from a cryptographic pseudorandom number generator (PRNG), which in turn is seeded by an entropy source. The security of the entire cryptographic system then relies on the accuracy of the claimed amount of entropy provided by the source. If the entropy source provides less unpredictability than is expected, the security of the cryptographic mechanisms is undermined, as in [5, 7, 10]. For this reason, correctly estimating the amount of entropy available from a source is critical.


Cryptography and Communications | 2018

The Multiplicative Complexity of 6-variable Boolean Functions

Çağdaş Çalık; Meltem Sönmez Turan; Rene C. Peralta

The multiplicative complexity of a Boolean function is the minimum number of two-input AND gates that are necessary and sufficient to implement the function over the basis (AND, XOR, NOT). Finding the multiplicative complexity of a given function is computationally intractable, even for functions with small number of inputs. Turan et al. [1] showed that n-variable Boolean functions can be implemented with at most n−1


International Journal of Information and Coding Theory | 2017

The number of boolean functions with multiplicative complexity 2

Daniel Smith-Tone; Meltem Sönmez Turan

n-1


Second International Workshop on Lightweight Cryptography for Security and Privacy (LightSec 2013) | 2013

Related-Key Slide Attacks on Block Ciphers with Secret Components

Meltem Sönmez Turan

AND gates for n≤5

Collaboration


Dive into the Meltem Sönmez Turan's collaboration.

Top Co-Authors

Avatar

John Kelsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Kerry A. McKay

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Rene C. Peralta

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Erdener Uyan

Middle East Technical University

View shared research outputs
Top Co-Authors

Avatar

Çağdaş Çalık

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Bart Preneel

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Gautham Sekar

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Nicky Mouha

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Søren S. Thomsen

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge