The Application of Hash Chains and Hash Structures to Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains" (2014)
University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2014 Improved Internet Security Protocols Using Cryptographic One- Way Hash Chains Amerah Alabrah University of Central Florida Part of the Computer Sciences Commons, and the Engineering Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Alabrah, Amerah, "Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains" (2014). Electronic Theses and Dissertations, 2004-2019. 4599. https://stars.library.ucf.edu/etd/4599 IMPROVED INTERNET SECURITY PROTOCOLS USING CRYPTOGRAPHIC ONE-WAY HASH CHAINS by AMERAH ABDULRAHMAN ALABRAH B.S. King Saud University, 2006 M.S. Colorado State University, 2008 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Electrical Engineering and Computer Science in the College of Engineering and Computer Science at the University of Central Florida Orlando, Florida Fall Term 2014 Major Professor: Mostafa Bassiouni © 2014 Amerah Alabrah ii ABSTRACT In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. -
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers TU Eindhoven [email protected] Abstract. We present explicit optimal binary pebbling algorithms for reversing one-way hash chains. For a hash chain of length 2k, the number of hashes performed in each output round does not exceed dk=2e, whereas the number of hash values stored (pebbles) throughout is at most k. This is optimal for binary pebbling algorithms characterized by the property that the midpoint of the hash chain is computed just once and stored until it is output, and that this property applies recursively to both halves of the hash chain. We introduce a framework for rigorous comparison of explicit binary peb- bling algorithms, including simple speed-1 binary pebbling, Jakobsson's speed-2 binary pebbling, and our optimal binary pebbling algorithm. Ex- plicit schedules describe for each pebble exactly how many hashes need to be performed in each round. The optimal schedule turns out to be es- sentially unique and exhibits a nice recursive structure, which allows for fully optimized implementations that can readily be deployed. In partic- ular, we develop the first in-place implementations with minimal storage overhead (essentially, storing only hash values), and fast implementations with minimal computational overhead. Moreover, we show that our ap- proach is not limited to hash chains of length n = 2k, but accommodates hash chains of arbitrary length n ≥ 1, without incurring any overhead. Finally, we show how to run a cascade of pebbling algorithms along with a bootstrapping technique, facilitating sequential reversal of an unlimited number of hash chains growing in length up to a given bound. -
Efficient Quantum-Immune Keyless Signatures with Identity
Efficient Quantum-Immune Keyless Signatures with Identity Ahto Buldas1;2, Risto Laanoja1;2, and Ahto Truu1 1 Guardtime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. [email protected] 2 Tallinn University of Technology, Ehitajate tee 5, 12618 Tallinn, Estonia. Abstract. We show how to extend hash-tree based data signatures to server-assisted personal digital signature schemes. The new signature scheme does not use trapdoor functions and is based solely on cryptographic hash functions and is thereby, considering the current state of knowledge, resistant to quantum computational attacks. In the new scheme, we combine hash-tree data signature (time- stamping) solutions with hash sequence authentication mechanisms. We show how to implement such a scheme in practice. 1 Introduction Electronic signatures use secret keys to protect the integrity of data. Keys can be compromised because of technical failures, human factor, or both threats in combination. In the creation process of electronic signatures, some types of secrets (keys, passwords, etc.) seem unavoidable, because secrets are necessary for authenticating the signer. Even if one uses biometric authentication, there must be a secure channel between the biometric reader and the signature creation device, and even if the signature creation device is physically (and securely) connected to biometric reader, the signature itself must be protected against modification (the integrity of signatures) and traditional solutions use public-key cryptography for that. This means that the validity of signatures depend on assumptions that some private keys are secure. For example, the keys of Public Key Infrastruc- ture (PKI) service providers like the OCSP responders are used to sign the validity statements of public-key certificates. -
A Study on the Concept of Using Efficient Lightweight Hash Chain To
applied sciences Article A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard Dohoon Kim 1 , Sang Seo 1, Heesang Kim 1, Won Gi Lim 2 and Youn Kyu Lee 3,* 1 Department of Computer Science, Kyonggi University, Suwon-si, Gyeonggi-do 16227, Korea; [email protected] (D.K.); [email protected] (S.S.); [email protected] (H.K.) 2 Agency for Defense Development (ADD), Seoul 05661, Korea; [email protected] 3 Department of Information Security, Seoul Women’s University, Seoul 01797, Korea * Correspondence: [email protected] Received: 23 November 2020; Accepted: 14 December 2020; Published: 16 December 2020 Abstract: Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TDL and MTN in a rapidly changing battlefield environment without reinforcement measures will lead to functional weaknesses and vulnerabilities when high-level digital-covert activities and deception tactics are implemented. Consequently, the existing VMF authentication scheme must be improved to secure transmission integrity, lower network transaction, and receive authentication tactical information in VMF-based combat network radio (CNR) networks. Therefore, in this study, a tactical wireless ad hoc network topology, similar to that of the existing CNRs, is considered, and a lightweight multi-factor hash chain-based authentication scheme that includes a time-based one-time password (T-OTP) for network overhead reduction and terminal authentication is proposed, coupled with exception handling.