• Treffer 3 von 5
Zurück zur Trefferliste

Analysis Design & Applications of Cryptographic Building Blocks

  • This thesis deals with the basic design and rigorous analysis of cryptographic schemes and primitives, especially of authenticated encryption schemes, hash functions, and password-hashing schemes. In the last decade, security issues such as the PS3 jailbreak demonstrate that common security notions are rather restrictive, and it seems that they do not model the real world adequately. As aThis thesis deals with the basic design and rigorous analysis of cryptographic schemes and primitives, especially of authenticated encryption schemes, hash functions, and password-hashing schemes. In the last decade, security issues such as the PS3 jailbreak demonstrate that common security notions are rather restrictive, and it seems that they do not model the real world adequately. As a result, in the first part of this work, we introduce a less restrictive security model that is closer to reality. In this model it turned out that existing (on-line) authenticated encryption schemes cannot longer beconsidered secure, i.e. they can guarantee neither data privacy nor data integrity. Therefore, we present two novel authenticated encryption scheme, namely COFFE and McOE, which are not only secure in the standard model but also reasonably secure in our generalized security model, i.e. both preserve full data inegrity. In addition, McOE preserves a resonable level of data privacy. The second part of this thesis starts with proposing the hash function Twister-Pi, a revised version of the accepted SHA-3 candidate Twister. We not only fixed all known security issues of Twister, but also increased the overall soundness of our hash-function design. Furthermore, we present some fundamental groundwork in the area of password-hashing schemes. This research was mainly inspired by the medial omnipresence of password-leakage incidences. We show that the password-hashing scheme scrypt is vulnerable against cache-timing attacks due to the existence of a password-dependent memory-access pattern. Finally, we introduce Catena the first password-hashing scheme that is both memory-consuming and resistant against cache-timing attacks.zeige mehrzeige weniger

Volltext Dateien herunterladen

Metadaten exportieren

Metadaten
Dokumentart:Dissertation
Verfasserangaben: Christian Forler
DOI (Zitierlink):https://doi.org/10.25643/bauhaus-universitaet.2376Zitierlink
URN (Zitierlink):https://nbn-resolving.org/urn:nbn:de:gbv:wim2-20150330-23764Zitierlink
Verlag:Shaker Verlag
Gutachter:Prof. Dr. rer. nat. Stefan LucksGND, Prof. Dr. rer. nat. Frederik ArmknechtGND
Betreuer:Prof. Dr. rer. nat. Stefan LucksGND
Sprache:Englisch
Datum der Veröffentlichung (online):30.03.2015
Datum der Erstveröffentlichung:30.03.2015
Datum der Abschlussprüfung:06.02.2015
Datum der Freischaltung:30.03.2015
Veröffentlichende Institution:Bauhaus-Universität Weimar
Titel verleihende Institution:Bauhaus-Universität Weimar, Fakultät Medien
Institute und Partnereinrichtugen:Fakultät Medien / Professur Mediensicherheit
Seitenzahl:213
Freies Schlagwort / Tag:authenticated encryption; hash functions; password scrambler; provable security; symmetric crypto
GND-Schlagwort:Kryptologie
DDC-Klassifikation:000 Informatik, Informationswissenschaft, allgemeine Werke
BKL-Klassifikation:53 Elektrotechnik
Lizenz (Deutsch):License Logo Creative Commons 4.0 - Namensnennung (CC BY 4.0)