Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/43667
Title: | Analysis of cryptographic hash functions | Authors: | Guo, Jian | Keywords: | DRNTU::Science::Mathematics::Discrete mathematics::Cryptography | Issue Date: | 2011 | Source: | Guo, J. (2011). Analysis of cryptographic hash functions. Doctoral thesis, Nanyang Technological University, Singapore. | Abstract: | This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under the framework of differential cryptanalysis, and applied them to LAKE, BLAKE, ARIRANG and BMW to find collisions. We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition. | URI: | https://hdl.handle.net/10356/43667 | DOI: | 10.32657/10356/43667 | Schools: | School of Physical and Mathematical Sciences | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | SPMS Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
thesis.pdf | 1.41 MB | Adobe PDF | View/Open |
Page view(s) 10
874
Updated on Oct 15, 2024
Download(s) 5
761
Updated on Oct 15, 2024
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.