Loading...
Search
Search in this resource
sort by
توابع چکیده ساز رمزنگاری با استفاده از گراف های بالنده
476 viewed

توابع چکیده ساز رمزنگاری با استفاده از گراف های بالنده

زارعی، افشین Zarei, Afshin

Cryptographic Hash Functions from Expander Graphs

Zarei, Afshin | 2014

476 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 46200 (02)
  4. University: Sharif University of Technology
  5. Department: Mathematical Sciences
  6. Advisor(s): khazaei, Shahram
  7. Abstract:
  8. A hash function maps efficiently every finite length string to a fixed one. The output represents the entire content of the input, similar to digital fingerprint of input text. In order to be able to use a hash function in cryptography, it should be hard to find two distinct inputs with the same output (collision), because finding a collision in hash functions leads to malicious attacks on many security systems.We say a hash function is provably collision resistant, if finding a collision can be reduced to the known hard problems. Family of MD hash functions are one of the most famous applied hash functions which are considerably used in industrial applications. However, they are not provably collision resistant. There exist some hash functions that are provably collision resistant, e.g. VSH and SWIFFT. In this study, we explain the structure of hash functions based on Pizer expander graphs. Then, the mathematical structure of the Pizer graph is used to investigate the collision resistance property of these hash functions
  9. Keywords:
  10. Cryptography ; Expander Graph ; Hash Function ; Pizer's Graph

 Digital Object List