Analysis of cryptographic hash functions

This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts'...

Full description

Saved in:
Bibliographic Details
Main Author: Guo, Jian
Other Authors: Wang Huaxiong
Format: Theses and Dissertations
Language:English
Published: 2011
Subjects:
Online Access:https://hdl.handle.net/10356/43667
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-43667
record_format dspace
spelling sg-ntu-dr.10356-436672023-02-28T23:34:35Z Analysis of cryptographic hash functions Guo, Jian Wang Huaxiong School of Physical and Mathematical Sciences DRNTU::Science::Mathematics::Discrete mathematics::Cryptography This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under the framework of differential cryptanalysis, and applied them to LAKE, BLAKE, ARIRANG and BMW to find collisions. We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition. MATHEMATICAL SCIENCES 2011-04-19T07:09:31Z 2011-04-19T07:09:31Z 2011 2011 Thesis Guo, J. (2011). Analysis of cryptographic hash functions. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/43667 10.32657/10356/43667 en 199 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle DRNTU::Science::Mathematics::Discrete mathematics::Cryptography
Guo, Jian
Analysis of cryptographic hash functions
description This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under the framework of differential cryptanalysis, and applied them to LAKE, BLAKE, ARIRANG and BMW to find collisions. We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition.
author2 Wang Huaxiong
author_facet Wang Huaxiong
Guo, Jian
format Theses and Dissertations
author Guo, Jian
author_sort Guo, Jian
title Analysis of cryptographic hash functions
title_short Analysis of cryptographic hash functions
title_full Analysis of cryptographic hash functions
title_fullStr Analysis of cryptographic hash functions
title_full_unstemmed Analysis of cryptographic hash functions
title_sort analysis of cryptographic hash functions
publishDate 2011
url https://hdl.handle.net/10356/43667
_version_ 1759853541171658752