Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Cryptographic Hash Functions

Abstract

Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv. Kryptografiske hashfunktioner har tiltrukket sig stor opmærksomhed inden for de senere år, da flere af de oftest anvendte hashfunktioner er blevet knækket. Denne ph.d.‐afhandling, med den danske titel ``Kryptografiske hashfunktioner'', indeholder både en generel beskrivelse af kryptografiske hashfunktioner, herunder anvendelser, forventede egenskaber samt nogle kendte design, og desuden nye design og nye kryptoanalytiske resultater. Den nye forskning inkluderer en metode til konstruktion af hashfunktioner samt fire design, hvoraf det ene blev indsendt til SHA‐3 konkurrencen arrangeret af det amerikanske standardiseringsinstitut NIST. Den inkluderer desuden ny opsigtsvækkende kryptoanalyse af hashfunktionerne MDC‐2 og MD2. MDC‐2 blev udviklet sidst i 1980erne af IBM, USA, og MD2 blev udviklet af Professor Ron Rivest fra MIT ligeledes i slutningen af 1980erne.Cryptographic hash functions are commonly used in many different areas of cryptography: in digital signatures and in public-key cryptography, for password protection and message authentication, in key derivation functions, in pseudo-random number generators, etc. Recently, cryptographic hash functions have received a huge amount of attention due to new attacks on widely used hash functions. This PhD thesis, having the title "Cryptographic Hash Functions", contains both a general description of cryptographic hash functions, including their applications and expected properties as well as some well-known designs, and also some design and cryptanalysis in which the author took part. The latter includes a construction method for hash functions and four designs, of which one was submitted to the SHA-3 hash function competition, initiated by the U.S. standardisation body NIST. It also includes cryptanalysis of the construction method MDC-2, and of the hash function MD2

Similar works

This paper was published in Online Research Database In Technology.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.