scholarly journals On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

Author(s):  
Praveen Gauravaram ◽  
Lars R. Knudsen
Author(s):  
Kannan Balasubramanian

Cryptographic Hash Functions are used to achieve a number of Security goals like Message Authentication, Message Integrity, and are also used to implement Digital Signatures (Non-repudiation), and Entity Authentication. This chapter discusses the construction of hash functions and the various attacks on the Hash functions. The Message Authentication Codes are similar to the Hash functions except that they require a key for producing the message digest or hash. Authenticated Encryption is a scheme that combines hashing and Encryption. The Various types of hash functions like one-way hash function, Collision Resistant hash function and Universal hash functions are also discussed in this chapter.


Author(s):  
Erik Dahmen ◽  
Katsuyuki Okeya ◽  
Tsuyoshi Takagi ◽  
Camille Vuillaume

Cryptologia ◽  
1993 ◽  
Vol 17 (3) ◽  
pp. 285-300
Author(s):  
Christoph Ruland

Mathematics ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 131 ◽  
Author(s):  
Víctor Gayoso Martínez ◽  
Luis Hernández-Álvarez ◽  
Luis Hernández Encinas

Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this technology and the foundations of its security. Among other elements, hash functions, digital signatures, elliptic curves, and Merkle trees are reviewed in the scope of their usage as building blocks of this technology.


Author(s):  
Manuel Mogollon

In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash functions, and the Keyed-Hash Message Authentication Code (HMAC). Also discussed are ways to verify a sender’s identity by using digital signatures.


2019 ◽  
Vol 1 (92) ◽  
pp. 59-64
Author(s):  
I.V. Kyrychenko ◽  
О. S. Nazarov ◽  
I. V. Gruzdo ◽  
N. Kozel

Blockchain is a distributed network that records digital transactions on a publicly accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and public/ private key pairs. Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. This paper suggests that the blockchain’s hash functions offer a better strategy for signature preservation than digital certificates. Compared to digital certificates, hashing provides better privacy and security. It is a form of authentication that does not require trust in a third-party authority, and the distributed nature of the blockchain network removes the problem of a single point of failure.


Author(s):  
Andreas Bolfing

Bitcoin’s security relies solely on cryptographic primitives, namely on digital signatures, hash functions and Merkle trees. This chapter discusses the security of the Bitcoin system if some primitives become weaker due to advances in cryptanalysis, an increasing computing power of the adversaries or improper software implementations. The chapter starts with a general overview of the primitives in use, explaining possible attack strategies against each of them, which is followed by combined attack strategies. The chapter closes by showing the consequences of Grover’s and Shor’s quantum algorithms for Bitcoin’s security.


Integrity is the property of information concerning protection against its unauthorized modifications and forgeries. This chapter discusses bulletin board (BB), hash functions, MACs (Message Authentication Codes) and digital signatures, as schemes for maintaining integrity of data. BBs protect data by simply disclosing them to the public, i.e. an entity cannot modify them without being watched by others. Hash functions, Macs, and digital signatures protect data by detecting illegitimate modifications while attaching values to the data. Namely, when an entity illegitimately modifies the data, the modified results become inconsistent with the attached values. When hash functions, MACs and digital signatures are compared regarding the ability to convince entities that the data are authorized ones, hash functions cannot enable entities to convince others, and by MACs, entities can convince others only when relevant secrets are properly protected. On the other hand, digital signatures enable anyone to convince others without constraints.


Sign in / Sign up

Export Citation Format

Share Document