IIIT-Delhi Institutional Repository

Secure design and instantiation of trapdoor-less truncated hash functions

Show simple item record

dc.contributor.author Bansal, Tarun Kumar
dc.contributor.author Sanadhya, Somitra Kumar (Advisor)
dc.date.accessioned 2013-07-11T10:29:16Z
dc.date.available 2013-07-11T10:29:16Z
dc.date.issued 2013-07-11T10:29:16Z
dc.identifier.uri https://repository.iiitd.edu.in/jspui/handle/123456789/104
dc.description.abstract In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given design. It is also assumed that security of a cryptographic construction should remain the same in practice as proven in theory. We show how a designer can act as adversary if he doesn't follow some basic paradigms while designing. To ensure that the basic assumptions, made while providing security proof of cryptographic construction, remain true and doubt free, we show that order of de ning the underlying primitives of security protocols are important. We use Hash-then-Truncate(HtT) construction as an example. While discussing security of HtT construction we show that order of de ning hash and truncation function is important. We also show that by providing choices of hash functions from a hash family to a user, we can securely instantiate the HtT construction. In this way, we can bridge the gap between design and practice. en_US
dc.language.iso en_US en_US
dc.subject Hash function and family en_US
dc.subject Secure instantiation en_US
dc.subject Block cipher en_US
dc.subject Trapdoor en_US
dc.subject Truncation en_US
dc.subject Design en_US
dc.subject Implementation en_US
dc.title Secure design and instantiation of trapdoor-less truncated hash functions en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account