Incremental hash functions
buir.advisor | Yeşilyurt, Hamza | |
dc.contributor.author | Karagöz, Emrah | |
dc.date.accessioned | 2016-01-08T18:27:32Z | |
dc.date.available | 2016-01-08T18:27:32Z | |
dc.date.issued | 2014 | |
dc.description | Ankara : The Department of Mathematics and The Graduate School of Engineering and Science of Bilkent University, 2014. | en_US |
dc.description | Thesis (Master's) -- Bilkent University, 2014. | en_US |
dc.description | Includes bibliographical references leaves 68-70. | en_US |
dc.description.abstract | Hash functions are one of the most important cryptographic primitives. They map an input of arbitrary finite length to a value of fixed length by compressing the input, that is why, they are called hash. They must run efficiently and satisfy some cryptographic security arguments. They are mostly used for data integrity and authentication such as digital signatures. Some hash functions such as SHA family (SHA1-SHA2) and MD family (MD2- MD4-MD5) are standardized to be used in cryptographic schemes. A common property about their construction is that they are all iterative. This property may cause an efficiency problem on big size data, because they have to run on the entire input even it is slightly changed. So the question is "Is it possible to reduce the computational costs of hash functions when small modifications are done on data?" In 1995, Bellare, Goldreich and Goldwasser proposed a new concept called incrementality: a function f is said to be incremental if f(x) can be updated in time proportional to the amount of modification on the input x. It brings out two main advantages on efficiency: incrementality and parallelizability. Moreover, it gives a provable security depending on hard problems such as discrete logarithm problem (DLP). The hash functions using incrementality are called Incremental Hash Functions. Moreover, in 2008, Dan Brown proposed an incremental hash function called ECOH by using elliptic curves, where DLP is especially harder on elliptic curves, and which are therefore quite popular mathematical objects in cryptography. We state incremental hash functions with some examples, especially ECOH , and give their security proofs depending on hard problems. | en_US |
dc.description.provenance | Made available in DSpace on 2016-01-08T18:27:32Z (GMT). No. of bitstreams: 1 0006672.pdf: 887275 bytes, checksum: 0d10524a61cc8df9eff3f94b98e56400 (MD5) | en |
dc.description.statementofresponsibility | Karagöz, Emrah | en_US |
dc.format.extent | xv, 80 leaves, tables | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/15967 | |
dc.language.iso | English | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Incremental Hash Functions | en_US |
dc.subject | MuHASH | en_US |
dc.subject | AdHASH | en_US |
dc.subject | ECOH | en_US |
dc.subject.lcc | QA76.9.A25 K37 2014 | en_US |
dc.subject.lcsh | Cryptography. | en_US |
dc.subject.lcsh | Data encryption (Computer Science) | en_US |
dc.title | Incremental hash functions | en_US |
dc.type | Thesis | en_US |
thesis.degree.discipline | Mathematics | |
thesis.degree.grantor | Bilkent University | |
thesis.degree.level | Master's | |
thesis.degree.name | MS (Master of Science) |
Files
Original bundle
1 - 1 of 1