Analysis of cryptographic hash functions
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts'...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2011
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/43667 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-43667 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-436672023-02-28T23:34:35Z Analysis of cryptographic hash functions Guo, Jian Wang Huaxiong School of Physical and Mathematical Sciences DRNTU::Science::Mathematics::Discrete mathematics::Cryptography This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under the framework of differential cryptanalysis, and applied them to LAKE, BLAKE, ARIRANG and BMW to find collisions. We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition. MATHEMATICAL SCIENCES 2011-04-19T07:09:31Z 2011-04-19T07:09:31Z 2011 2011 Thesis Guo, J. (2011). Analysis of cryptographic hash functions. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/43667 10.32657/10356/43667 en 199 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Science::Mathematics::Discrete mathematics::Cryptography |
spellingShingle |
DRNTU::Science::Mathematics::Discrete mathematics::Cryptography Guo, Jian Analysis of cryptographic hash functions |
description |
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under the framework of differential cryptanalysis, and applied them to LAKE, BLAKE, ARIRANG and BMW to find collisions. We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition. |
author2 |
Wang Huaxiong |
author_facet |
Wang Huaxiong Guo, Jian |
format |
Theses and Dissertations |
author |
Guo, Jian |
author_sort |
Guo, Jian |
title |
Analysis of cryptographic hash functions |
title_short |
Analysis of cryptographic hash functions |
title_full |
Analysis of cryptographic hash functions |
title_fullStr |
Analysis of cryptographic hash functions |
title_full_unstemmed |
Analysis of cryptographic hash functions |
title_sort |
analysis of cryptographic hash functions |
publishDate |
2011 |
url |
https://hdl.handle.net/10356/43667 |
_version_ |
1759853541171658752 |