哈希函数安全性中的基本密码学概念和开放问题

J. Smith, Donald Mills
{"title":"哈希函数安全性中的基本密码学概念和开放问题","authors":"J. Smith, Donald Mills","doi":"10.55632/pwvas.v95i2.993","DOIUrl":null,"url":null,"abstract":"JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Dept of Computer Sciences, Mathematics, and Engineering, Shepherd University, Shepherdstown, WV, 25443. Analysis of basic cryptographic concepts and recent open problems in hash function security.  \n  \nThe objectives of this study are to show an understanding of cryptographic concepts as well as highlight recent open problems involving hash function security. The method of study used included reading the first five chapters of Cryptography: Theory and Practice by Stinson and Paterson as well as a recent paper that outlined open problems in hash function security. Then, written reports were delivered on the information learned which included selected proofs and solved examples. The essentials of the opening report introduce the basic elements of cryptography: cryptosystems, cryptographic tools, message integrity, protocols, and security approaches. Chapter 2 of “Cryptography” describes various types of ciphers including Shift, Substitution, Affine, Vigenère, Hill, Permutation, and Stream Ciphers, as well as how to cryptanalyze them. The third report focuses on the One-time Pad, entropy, perfect security, and cryptographic security, specifically unconditional security, as introduced by Claude Shannon in his work on information theory. Throughout the fourth report, block and stream ciphers, including substitution-permutation networks, attacks such as linear and differential cryptanalysis, and modes of operation are discussed. In the fifth report, basic concepts of cryptography, hash function and message authentication are discussed, including iterated hash function, sponge construction, and unconditionally secure MACS. Using the information learned from the previous reports, current problems in hash functions were then researched. In conclusion, open problems in hash function security include collision resistance, preimage resistance, and resistant to length extension attacks. The project was sponsored by the NSF S-STEM Grant (DUE-2130267).  ","PeriodicalId":92280,"journal":{"name":"Proceedings of the West Virginia Academy of Science","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Basic Cryptographic Concepts and Open Problems in Hash Function Security\",\"authors\":\"J. Smith, Donald Mills\",\"doi\":\"10.55632/pwvas.v95i2.993\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Dept of Computer Sciences, Mathematics, and Engineering, Shepherd University, Shepherdstown, WV, 25443. Analysis of basic cryptographic concepts and recent open problems in hash function security.  \\n  \\nThe objectives of this study are to show an understanding of cryptographic concepts as well as highlight recent open problems involving hash function security. The method of study used included reading the first five chapters of Cryptography: Theory and Practice by Stinson and Paterson as well as a recent paper that outlined open problems in hash function security. Then, written reports were delivered on the information learned which included selected proofs and solved examples. The essentials of the opening report introduce the basic elements of cryptography: cryptosystems, cryptographic tools, message integrity, protocols, and security approaches. Chapter 2 of “Cryptography” describes various types of ciphers including Shift, Substitution, Affine, Vigenère, Hill, Permutation, and Stream Ciphers, as well as how to cryptanalyze them. The third report focuses on the One-time Pad, entropy, perfect security, and cryptographic security, specifically unconditional security, as introduced by Claude Shannon in his work on information theory. Throughout the fourth report, block and stream ciphers, including substitution-permutation networks, attacks such as linear and differential cryptanalysis, and modes of operation are discussed. In the fifth report, basic concepts of cryptography, hash function and message authentication are discussed, including iterated hash function, sponge construction, and unconditionally secure MACS. Using the information learned from the previous reports, current problems in hash functions were then researched. In conclusion, open problems in hash function security include collision resistance, preimage resistance, and resistant to length extension attacks. The project was sponsored by the NSF S-STEM Grant (DUE-2130267).  \",\"PeriodicalId\":92280,\"journal\":{\"name\":\"Proceedings of the West Virginia Academy of Science\",\"volume\":\"18 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the West Virginia Academy of Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55632/pwvas.v95i2.993\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the West Virginia Academy of Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55632/pwvas.v95i2.993","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

约翰娜·史密斯(JOHNNA SMITH),谢泼德大学数学系,西弗吉尼亚州谢泼德斯敦,25443;唐纳德·米尔斯(DONALD MILLS),谢泼德大学计算机科学、数学和工程系,西弗吉尼亚州谢泼德斯敦,25443。分析了基本的密码学概念和哈希函数安全性的最新开放问题。本研究的目的是展示对密码学概念的理解,并强调涉及哈希函数安全性的最新开放问题。使用的学习方法包括阅读Stinson和Paterson的《密码学:理论与实践》的前五章,以及最近概述了哈希函数安全性中开放问题的一篇论文。然后,就学习到的信息提交书面报告,其中包括选择的证明和解决的例子。开场报告的要点介绍了密码学的基本要素:密码系统、密码工具、消息完整性、协议和安全方法。“密码学”的第2章描述了各种类型的密码,包括移位,替换,仿射,vigen,希尔,排列和流密码,以及如何对它们进行密码分析。第三份报告侧重于一次性Pad、熵、完美安全性和加密安全性,特别是无条件安全性,这是Claude Shannon在他的信息论工作中介绍的。在整个第四份报告中,讨论了分组和流密码,包括替换置换网络,攻击,如线性和差分密码分析,以及操作模式。第五篇报告讨论了密码学、哈希函数和消息认证的基本概念,包括迭代哈希函数、海绵构造和无条件安全MACS。利用从前面的报告中学到的信息,研究了当前哈希函数中存在的问题。总之,哈希函数安全性中的开放性问题包括抗碰撞、抗预像和抗长度扩展攻击。本项目由NSF S-STEM基金(du -2130267)资助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Basic Cryptographic Concepts and Open Problems in Hash Function Security
JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Dept of Computer Sciences, Mathematics, and Engineering, Shepherd University, Shepherdstown, WV, 25443. Analysis of basic cryptographic concepts and recent open problems in hash function security.    The objectives of this study are to show an understanding of cryptographic concepts as well as highlight recent open problems involving hash function security. The method of study used included reading the first five chapters of Cryptography: Theory and Practice by Stinson and Paterson as well as a recent paper that outlined open problems in hash function security. Then, written reports were delivered on the information learned which included selected proofs and solved examples. The essentials of the opening report introduce the basic elements of cryptography: cryptosystems, cryptographic tools, message integrity, protocols, and security approaches. Chapter 2 of “Cryptography” describes various types of ciphers including Shift, Substitution, Affine, Vigenère, Hill, Permutation, and Stream Ciphers, as well as how to cryptanalyze them. The third report focuses on the One-time Pad, entropy, perfect security, and cryptographic security, specifically unconditional security, as introduced by Claude Shannon in his work on information theory. Throughout the fourth report, block and stream ciphers, including substitution-permutation networks, attacks such as linear and differential cryptanalysis, and modes of operation are discussed. In the fifth report, basic concepts of cryptography, hash function and message authentication are discussed, including iterated hash function, sponge construction, and unconditionally secure MACS. Using the information learned from the previous reports, current problems in hash functions were then researched. In conclusion, open problems in hash function security include collision resistance, preimage resistance, and resistant to length extension attacks. The project was sponsored by the NSF S-STEM Grant (DUE-2130267).  
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Symmetry Equivalents of the Weak Value Measurement Pointer Hamiltonian West Virginia Human Whole-Body Donors in Undergraduate Biology Education at Radford University Geographical Impact of Human Gift Registries in West Virginia: A Model for Centralized Resources in Human Anatomy Education Geographical Impact of Human Gift Registries in West Virginia: A Model for Centralized Resources in Human Anatomy Education Evaluation of sample collection containers for selenium quantification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1