Basic Cryptographic Concepts and Open Problems in Hash Function Security
نویسندگان
چکیده
JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Computer Sciences, Engineering, 25443. Analysis basic cryptographic concepts recent open problems in hash function security. 
 The objectives this study are to show an understanding as well highlight involving method used included reading the first five chapters Cryptography: Theory Practice by Stinson Paterson a paper that outlined Then, written reports were delivered on information learned which selected proofs solved examples. essentials opening report introduce elements cryptography: cryptosystems, tools, message integrity, protocols, security approaches. Chapter 2 “Cryptography” describes various types ciphers including Shift, Substitution, Affine, Vigenère, Hill, Permutation, Stream Ciphers, how cryptanalyze them. third focuses One-time Pad, entropy, perfect security, specifically unconditional introduced Claude Shannon his work theory. Throughout fourth report, block stream ciphers, substitution-permutation networks, attacks such linear differential cryptanalysis, modes operation discussed. In fifth cryptography, authentication discussed, iterated function, sponge construction, unconditionally secure MACS. Using from previous reports, current functions then researched. conclusion, include collision resistance, preimage resistant length extension attacks. project was sponsored NSF S-STEM Grant (DUE-2130267).
منابع مشابه
Open problems in hash function security
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode of operation, and the compression function itself is often designed from block ciphers or permutations. This modular design approach allows for a rigorous security analysis via me...
متن کاملSMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...
متن کاملFinding Bugs in Cryptographic Hash Function Implementations
Developing an approach to test cryptographic hash function implementations can be particularly difficult, and bugs can remain unnoticed for a very long time. We revisit the NIST SHA-3 hash function competition, and apply a new testing strategy to all available reference implementations. Motivated by the cryptographic properties that a hash function should satisfy, we develop four types of tests...
متن کاملDynamical Behavior of a Rigid Body with One Fixed Point (Gyroscope). Basic Concepts and Results. Open Problems: a Review
The study of the dynamic behavior of a rigid body with one fixed point (gyroscope) has a long history. A number of famous mathematicians and mechanical engineers have devoted enormous time and effort to clarify the role of dynamic effects on its movement (behavior) – stable, periodic, quasi-periodic or chaotic. The main objectives of this review are: 1) to outline the characteristic features of...
متن کاملNew Way to Construct Cryptographic Hash Function
In this paper, a new way to construct cryptographic hash function is given. The cryptographic hash function is generalized to uncertain function which has various specific function forms. When computing hash value, the specific form of the function is determined by the message, but the codebreaker cannot know the message, and hence cannot know the specific form of random function. This provides...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the West Virginia Academy of Science
سال: 2023
ISSN: ['0096-4263', '2473-0386']
DOI: https://doi.org/10.55632/pwvas.v95i2.993