Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions. In this thesis we will introduce the definitions of hash functions and cryptographic hash functions, comment on the ideas that underlie and inspire these definitions and design the probabilistic models in which they become rigorous mathematical concepts. In Chapter 3, we will examine three cryptographic attacks against specific hash functions, calculate the expected cost of execution and estimate the real-world security associated with such functions.

Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions. In this thesis we will introduce the definitions of hash functions and cryptographic hash functions, comment on the ideas that underlie and inspire these definitions and design the probabilistic models in which they become rigorous mathematical concepts. In Chapter 3, we will examine three cryptographic attacks against specific hash functions, calculate the expected cost of execution and estimate the real-world security associated with such functions.

On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks

DALLATORRE, FILIPPO
2022/2023

Abstract

Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions. In this thesis we will introduce the definitions of hash functions and cryptographic hash functions, comment on the ideas that underlie and inspire these definitions and design the probabilistic models in which they become rigorous mathematical concepts. In Chapter 3, we will examine three cryptographic attacks against specific hash functions, calculate the expected cost of execution and estimate the real-world security associated with such functions.
2022
On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks
Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions. In this thesis we will introduce the definitions of hash functions and cryptographic hash functions, comment on the ideas that underlie and inspire these definitions and design the probabilistic models in which they become rigorous mathematical concepts. In Chapter 3, we will examine three cryptographic attacks against specific hash functions, calculate the expected cost of execution and estimate the real-world security associated with such functions.
hash functions
cryptography
hash
File in questo prodotto:
File Dimensione Formato  
Tesi_Hash_Filippo-13-1.pdf

accesso aperto

Dimensione 960.5 kB
Formato Adobe PDF
960.5 kB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/61298