The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 2 of 4
Back to Result List

Analysis Design & Applications of Cryptographic Building Blocks

  • This thesis deals with the basic design and rigorous analysis of cryptographic schemes and primitives, especially of authenticated encryption schemes, hash functions, and password-hashing schemes. In the last decade, security issues such as the PS3 jailbreak demonstrate that common security notions are rather restrictive, and it seems that they do not model the real world adequately. As aThis thesis deals with the basic design and rigorous analysis of cryptographic schemes and primitives, especially of authenticated encryption schemes, hash functions, and password-hashing schemes. In the last decade, security issues such as the PS3 jailbreak demonstrate that common security notions are rather restrictive, and it seems that they do not model the real world adequately. As a result, in the first part of this work, we introduce a less restrictive security model that is closer to reality. In this model it turned out that existing (on-line) authenticated encryption schemes cannot longer beconsidered secure, i.e. they can guarantee neither data privacy nor data integrity. Therefore, we present two novel authenticated encryption scheme, namely COFFE and McOE, which are not only secure in the standard model but also reasonably secure in our generalized security model, i.e. both preserve full data inegrity. In addition, McOE preserves a resonable level of data privacy. The second part of this thesis starts with proposing the hash function Twister-Pi, a revised version of the accepted SHA-3 candidate Twister. We not only fixed all known security issues of Twister, but also increased the overall soundness of our hash-function design. Furthermore, we present some fundamental groundwork in the area of password-hashing schemes. This research was mainly inspired by the medial omnipresence of password-leakage incidences. We show that the password-hashing scheme scrypt is vulnerable against cache-timing attacks due to the existence of a password-dependent memory-access pattern. Finally, we introduce Catena the first password-hashing scheme that is both memory-consuming and resistant against cache-timing attacks.show moreshow less

Download full text files

Export metadata

Metadaten
Document Type:Doctoral Thesis
Author: Christian Forler
DOI (Cite-Link):https://doi.org/10.25643/bauhaus-universitaet.2376Cite-Link
URN (Cite-Link):https://nbn-resolving.org/urn:nbn:de:gbv:wim2-20150330-23764Cite-Link
Publisher:Shaker Verlag
Referee:Prof. Dr. rer. nat. Stefan LucksGND, Prof. Dr. rer. nat. Frederik ArmknechtGND
Advisor:Prof. Dr. rer. nat. Stefan LucksGND
Language:English
Date of Publication (online):2015/03/30
Date of first Publication:2015/03/30
Date of final exam:2015/02/06
Release Date:2015/03/30
Publishing Institution:Bauhaus-Universität Weimar
Granting Institution:Bauhaus-Universität Weimar, Fakultät Medien
Institutes and partner institutions:Fakultät Medien / Professur Mediensicherheit
Pagenumber:213
Tag:authenticated encryption; hash functions; password scrambler; provable security; symmetric crypto
GND Keyword:Kryptologie
Dewey Decimal Classification:000 Informatik, Informationswissenschaft, allgemeine Werke
BKL-Classification:53 Elektrotechnik
Licence (German):License Logo Creative Commons 4.0 - Namensnennung (CC BY 4.0)