Özet fonksiyon algoritması geliştirme proje önerisi

Download
2008
Sulak, Fatih
Doğanaksoy, Ali
Varıcı, Kerem
Kocair, Çelebi
Atalay, Firuze
Recent years witnessed the continuous works on analysis of cryptographic hash functions which reveal that most of them are not as secure as claimed. Wang et al. presented the first full round collisions on MD4 and RIPEMD using a new attack technique on hash functions which is based on differential cryptanalysis. Then, this attack is further developed and used in the analysis of other famous and widely used hash functions. As a result of these studies, National Institute of Standards and Technology (NIST) announced a public competition of designing a new hash function which will be chosen as the new hash function standard (Secure Hash Algorithm 3, (S HA − 3)). It is expected from new algorithm to provide security bounds for preimage, second-preimage and collision attacks, besides being resistant against all known attack methods. The new hash standard is expected to support variable hash sizes to be used for variable purposes. Moreover, the design should be efficient in both software and hardware implementations. We present a new cryptographic hash function family, Sarmal, which is designed to satisfy all the properties above as a candidate for the S HA − 3 competition. It uses the well known components from block cipher theory to satisfy both security/efficiency trade-off. On the other hand, HAIFA iterative hashing mode is used to prevent latest weaknesses of standard Merkle-Damgård paradigm and provide flexible hash size. Moreover, software implementations reveal that Sarmal can be very efficient on multiple platforms.

Suggestions

Özet fonksiyonların güvenlik ölçütleri ve analiz metotları geliştirme ve uygulama projesi
Uyan, Erdener; Sulak, Fatih; Çakçak, Emrah; Bilgin, Begül; Çalık, Çağdaş(2010)
National Institute of Standards and Technology (NIST) has announced a hash function competition to define a new hash function standard (SHA-3), regarding the recent cryptanalysis efforts which showed that the existing hash functions are not secure. The main goals of this project are detecting the weaknesses of the proposed SHA-3 candidate algorithms, applying existing cryptanalysis methods to these algorithms, and developing new cryptanalysis methods. As a starting point, the fundamental building blocks of ...
Design and analysis of hash functions
Koçak, Onur; Doğanaksoy, Ali; Department of Cryptography (2009)
Hash functions are cryptographic tools that are used in various applications like digital signature, message integrity checking, password storage and random number generation. These cryptographic primitives were, first, constructed using modular arithmetical operations which were popular at that time because of public key cryptography. Later, in 1989, Merkle and Damgard independently proposed an iterative construction method. This method was easy to implement and had a security proof. MD-4 was the first has...
On the security of tiger hash function
Özen, Onur; Doğanaksoy, Ali; Department of Cryptography (2008)
Recent years have witnessed several real threats to the most widely used hash functions which are generally inspired from MD4, such as MD5, RIPEMD, SHA0 and SHA1. These extraordinary developments in cryptanalysis of hash functions brought the attention of the cryptology researchers to the alternative designs. Tiger is an important type of alternative hash functions and is proved to be secure so far as there is no known collision attack on the full (24 rounds) Tiger. It is designed by Biham and Anderson in 1...
A high-speed asic implementation of the RSA cryptosystem
Yeşil, Soner; Aşkar, Murat; Department of Electrical and Electronics Engineering (2003)
This thesis presents the ASIC implementation of the RSA algorithm, which is one of the most widely used Public Key Cryptosystems (PKC) in the world. In RSA Cryptosystem, modular exponentiation of large integers is used for both encryption and decryption processes. The security of the RSA increases as the number of the bits increase. However, as the numbers become larger (1024-bit or higher) the challenge is to provide architectures, which can be implemented in hardware, operate at high clock speeds, use a m...
A Study on countermeasures on AES against side channel attacks
Çenesiz, Damla; Özbudak, Ferruh; Department of Cryptography (2019)
Side Channel Attacks have a important role for security of cryptographic algorithm. There are different method which include Threshold Implementation to protect against these kind of attacks. In this thesis, we study certain countermeasures to side channel attacks for AES. We start with a survey on Side Channel Attacks for block ciphers and we mentioned attack models for AES.We give also partical attention Treshold Implementation properties and construction methods. We also give some details of subfield con...
Citation Formats
F. Sulak, A. Doğanaksoy, K. Varıcı, Ç. Kocair, and F. Atalay, “Özet fonksiyon algoritması geliştirme proje önerisi,” 2008. Accessed: 00, 2020. [Online]. Available: https://app.trdizin.gov.tr/publication/project/detail/T0RVeE5UVT0.