The application of hash chains and hash structures to cryptography

Thomas Page

(2009)

Thomas Page (2009) The application of hash chains and hash structures to cryptography.

Our Full Text Deposits

Full text access: Open

RHUL-MA-2009-18.pdf - 958.56 KB

Abstract

In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to form a catalogue of structures that we apply to various cryptographic applications. We study existing work on authentication and create many entity authentication schemes based on structures from our catalogue. We present a novel algorithm to find efficient signature schemes from any given hash structure. We study some suggestions for suitable hash structures and define a particular scalable hash structure complete with a simple message to signature map that is the most efficient such scheme of which we know. We explore k-time signature schemes and identify two new properties, which we call perforated and porous. We look at the application of hash structures to key establishment schemes. We compare the existing schemes and make improvements on many. We present a new key establishment scheme, and show a link between certain k-time signatures and certain key establishment schemes. We look at the other applications of hash structures, and suggest areas in which our catalogue could be used for further development.

Information about this Version

This is a Submitted version
This version's date is: 2009
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/31df8a80-0af6-4de3-9842-366f8549c3ae/1/

Item TypeThesis (Doctoral)
TitleThe application of hash chains and hash structures to cryptography
AuthorsPage, Thomas
Uncontrolled Keywordshash chains; hash structures; cryptography; authentication; signatures; key establishment
DepartmentsFaculty of Science\Mathematics

Deposited by Leanne Workman (UXYL007) on 30-Apr-2015 in Royal Holloway Research Online.Last modified on 05-Feb-2017

Notes

©2009 Thomas Page. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit including © notice, is given to the source.


Details