Cryptographic hash functions : cryptanalysis, design and applications
Gauravaram, Praveen Srinivasa (2007) Cryptographic hash functions : cryptanalysis, design and applications. PhD thesis, Queensland University of Technology.
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design principle of Merkle-Damgard iterated hash function construction which was presented independently by Ivan Damgard and Ralph Merkle at Crypto'89. It has been established that neither these hash functions nor the Merkle-Damgard construction itself meet certain security requirements. This thesis aims to study the attacks on this popular construction and propose schemes that offer more resistance against these attacks as well as investigating alternative approaches to the Merkle-Damgard style of designing hash functions. This thesis aims at analysing the security of the standard hash function Cellular Authentication and Voice Encryption Algorithm (CAVE) used for authentication and key-derivation in the second generation (2G) North American IS-41 mobile phone system. In addition, this thesis studies the analysis issues of message authentication codes (MACs) designed using hash functions. With the aim to propose some efficient and secure MAC schemes based on hash functions.
This thesis works on three aspects of hash functions: design, cryptanalysis and applications with the following significant contributions:
Proposes a family of variants to the Damgard-Merkle construction called 3CG for better protection against specific and generic attacks. Analysis of the linear variant of 3CG called 3C is presented including its resistance to some of the known attacks on hash functions.
Improves the known cryptanalytical techniques to attack 3C and some other similar designs including a linear variant of GOST, a Russian standard hash function.
Proposes a completely novel approach called Iterated Halving, alternative to the standard block iterated hash function construction.
Analyses provably secure HMAC and NMAC message authentication codes (MACs) based on weaker assumptions than stated in their proofs of security. Proposes an efficient variant for NMAC called NMAC-1 to authenticate short messages. Proposes a variant for NMAC called M-NMAC which offers better protection against the complete key-recovery attacks than NMAC. As well it is shown that M-NMAC with hash functions also resists side-channel attacks against which HMAC and NMAC are vulnerable. Proposes a new MAC scheme called O-NMAC based on hash functions using just one secret key.
Improves the open cryptanalysis of the CAVE algorithm.
Analyses the security and legal implications of the latest collision attacks on the widely used MD5 and SHA-1 hash functions.
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||QUT Thesis (PhD)|
|Supervisor:||Millan, William& May, Lauren|
|Keywords:||cryptography, hash functions, cryptanalysis, design, applications, Merkle-Damgard construction, CAVE, 3CG, 3C, GOST-L, F-Hash, NMAC, HMAC, O-NMAC, M-NMAC, NMAC-1, iterated halving, digital signatures, side-channel attacks, practical and legal implications|
|Divisions:||Current > QUT Faculties and Divisions > Division of Research and Commercialisation|
Past > Institutes > Information Security Institute
|Institution:||Queensland University of Technology|
|Copyright Owner:||Copyright Praveen Srinivasa Gauravaram|
|Deposited On:||03 Dec 2008 14:02|
|Last Modified:||29 Oct 2011 05:46|
Repository Staff Only: item control page