schliessen

Filtern

 

Bibliotheken

Design and analysis of cryptographic algorithms for authentication / Jakob Wenzel

During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous groundbreaking research topics in the field of cryptography. This thesis focuses on the design and analysis of cryptographic primitives and schemes to be used for authentication of... Full description

PPN (Catalogue-ID): 1008608238
Personen: Wenzel, Jakob [VerfasserIn]
Lucks, Stefan [GutachterIn]
Leander, Nils-Gregor [GutachterIn]
Cooperations/Conferences: Bauhaus-Universität Weimar [Grad-verleihende Institution]
Format: eBook eBook
Language: English
Hochschule: Dissertation, Bauhaus-Universität Weimar, Fakultät Medien, 2017
Basisklassifikation: 54.38 Computersicherheit
Subjects:

Kryptologie

Hash-Algorithmus

Blockchiffre

Kryptologie / Hash-Algorithmus / Blockchiffre

Lokale Schlagwörter:

Kryptologie (Opus)

Formangabe: Hochschulschrift
Physical Description: 1 Online-Ressource (196 Seiten)

Similar Items

Vorhandene Hefte/Bände

more (+)

Informationen zur Verfügbarkeit werden geladen

Staff View
LEADER 08678nmm a2201333 c 4500
001 1008608238
003 DE-601
005 20190214084747.0
007 cr uuu---uuuuu
008 171211s2017 gw o 000 0 eng d
015 |a 18O01  |2 dnb 
016 7 |a 1148945474  |2 DE-101 
024 7 |a urn:nbn:de:gbv:wim2-20171208-37140  |2 urn 
035 |a (DE-101)1148945474 
035 |a (DE-599)GBV1008608238 
040 |b ger  |c GBVCP  |e rda 
041 0 |a eng 
082 0 0 |a 004 
082 0 9 |a 004 
084 |a 54.38  |9 Computersicherheit  |2 bkl 
100 1 |a Wenzel, Jakob  |e verfasserin  |4 aut 
245 1 0 |a Design and analysis of cryptographic algorithms for authentication  |h Elektronische Ressource  |c Jakob Wenzel 
300 |a 1 Online-Ressource (196 Seiten) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
502 |b Dissertation  |c Bauhaus-Universität Weimar, Fakultät Medien  |d 2017 
520 |a During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous groundbreaking research topics in the field of cryptography. This thesis focuses on the design and analysis of cryptographic primitives and schemes to be used for authentication of data and communication endpoints, i.e., users. It is structured into three parts, where we present the first freely scalable multi-block-length block-cipher-based compression function (Counter-bDM) in the first part. The presented design is accompanied by a thorough security analysis regarding its preimage and collision security. The second and major part is devoted to password hashing. It is motivated by the large amount of leaked password during the last years and our discovery of side-channel attacks on scrypt – the first modern password scrambler that allowed to parameterize the amount of memory required to compute a password hash. After summarizing which properties we expect from a modern password scrambler, we (1) describe a cache-timing attack on scrypt based on its password-dependent memory-access pattern and (2) outline an additional attack vector – garbage-collector attacks – that exploits optimization which may disregard to overwrite the internally used memory. Based on our observations, we introduce Catena – the first memory-demanding password-scrambling framework that allows a password-independent memory-access pattern for resistance to the aforementioned attacks. Catena was submitted to the Password Hashing Competition (PHC) and, after two years of rigorous analysis, ended up as a finalist gaining special recognition for its agile framework approach and side-channel resistance. We provide six instances of Catena suitable for a variety of applications. We close the second part of this thesis with an overview of modern password scramblers regarding their functional, security, and general properties; supported by a brief analysis of their resistance to garbage-collector attacks. The third part of this thesis is dedicated to the integrity (authenticity of data) of nonce-based authenticated encryption schemes (NAE). We introduce the so-called j-IV-Collision Attack, allowing to obtain an upper bound for an adversary that is provided with a first successful forgery and tries to efficiently compute j additional forgeries for a particular NAE scheme (in short: reforgeability). Additionally, we introduce the corresponding security notion j-INT-CTXT and provide a comparative analysis (regarding j-INT-CTXT security) of the third-round submission to the CAESAR competition and the four classical and widely used NAE schemes CWC, CCM, EAX, and GCM. 
583 |a lzar:   |k Langzeitarchivierung gewährleistet 
650 7 |0 (DE-601)106257862  |0 (DE-588)4033329-2  |a Kryptologie  |2 gnd 
650 7 |0 (DE-601)128104287  |0 (DE-588)4323071-4  |a Hash-Algorithmus  |2 gnd 
650 7 |0 (DE-601)128434554  |0 (DE-588)4323693-5  |a Blockchiffre  |2 gnd 
655 0 7 |0 (DE-588)4113937-9  |a Hochschulschrift  |2 gnd-content 
689 0 0 |0 (DE-601)106257862  |0 (DE-588)4033329-2  |D s  |a Kryptologie 
689 0 1 |0 (DE-601)128104287  |0 (DE-588)4323071-4  |D s  |a Hash-Algorithmus 
689 0 2 |0 (DE-601)128434554  |0 (DE-588)4323693-5  |D s  |a Blockchiffre 
689 0 |5 DE-601 
700 1 |a Lucks, Stefan  |e gutachterin  |4 oth  |0 (DE-601)07922508X  |0 (DE-588)118070339 
700 1 |a Leander, Nils-Gregor  |e gutachterin  |4 oth  |0 (DE-601)477587976  |0 (DE-588)129692719 
710 2 |a Bauhaus-Universität Weimar  |e Grad-verleihende Institution  |4 dgg  |0 (DE-601)214200515  |0 (DE-588)5180842-0 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Wenzel, Jakob  |t Design and analysis of cryptographic algorithms for authentication  |d Weimar, Oktober 2017  |h ix, 141 Seiten, 15 ungezählte Seiten : Diagramme  |w (DE-601)1007511281 
856 4 0 |u https://e-pub.uni-weimar.de/opus4/frontdoor/index/index/docId/3714  |q application/pdf  |z LF 
856 4 0 |u http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140  |q application/pdf  |z LF 
856 4 1 |u http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140  |3 Volltext 
856 4 1 |u http://d-nb.info/1148945474/34  |3 Volltext 
856 4 1 |u https://e-pub.uni-weimar.de/opus4/frontdoor/index/index/docId/3714  |z kostenfrei  |3 Volltext 
912 |a GBV_ILN_20 
912 |a SYSFLAG_1 
912 |a GBV_GVK 
912 |a GBV_ILN_21 
912 |a GBV_ILN_22 
912 |a GBV_ILN_23 
912 |a GBV_ILN_30 
912 |a GBV_ILN_32 
912 |a GBV_ILN_40 
912 |a GBV_ILN_60 
912 |a GBV_ILN_63 
912 |a GBV_ILN_70 
912 |a GBV_ILN_105 
912 |a GBV_ILN_110 
912 |a GBV_ILN_132 
912 |a GBV_ILN_161 
912 |a GBV_ILN_170 
912 |a GBV_ILN_213 
912 |a GBV_ILN_293 
912 |a GBV-ODiss 
950 |a Kryptologie  |2 Opus 
951 |a BO 
980 |2 20  |1 01  |b 1739550110  |x 0084  |y x  |z 05-01-18 
980 |2 21  |1 01  |b 1739565762  |x 0046  |y z  |z 05-01-18 
980 |2 22  |1 01  |b 173958127X  |h SUBolrd  |x 0018  |y xu  |z 05-01-18 
980 |2 23  |1 01  |b 1739596625  |h olr-d  |x 0830  |y x  |z 05-01-18 
980 |2 30  |1 01  |b 1739623274  |x 0104  |y z  |z 05-01-18 
980 |2 32  |1 01  |b 1751585093  |f Online  |d INF 2018  |x 3400  |y k  |z 16-02-18 
980 |2 40  |1 01  |b 1739637429  |x 0007  |y xsn  |z 05-01-18 
980 |2 60  |1 01  |b 173966874X  |h OLRD  |x 0705  |y z  |z 05-01-18 
980 |2 63  |1 01  |b 1729525512  |h E-Book LF Opus  |x 3401  |y z  |z 11-12-17 
980 |2 70  |1 01  |b 1739691377  |x 0089  |y zdt  |z 05-01-18 
980 |2 105  |1 01  |b 1739772318  |x 0841  |y z  |z 05-01-18 
980 |2 110  |1 01  |b 1739701984  |x 3110  |y x  |z 05-01-18 
980 |2 132  |1 01  |b 1739712994  |h OLR-DISS  |x 0959  |y x  |z 05-01-18 
980 |2 161  |1 01  |b 1739728467  |h ORD  |x 0960  |y x  |z 05-01-18 
980 |2 170  |1 01  |b 1751701530  |d E-Dissertation  |e o  |l EDISS  |x 3027  |y zi1  |z 26-04-16 
980 |2 213  |1 01  |b 1739739140  |h ORD  |x 0551  |y x  |z 05-01-18 
980 |2 293  |1 01  |b 1739759982  |h ORD  |x 3293  |y xf  |z 05-01-18 
981 |2 20  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 21  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 22  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 23  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 30  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 40  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 60  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 63  |1 01  |y Volltext  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140  |3 04-Q-GBV 
981 |2 70  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 105  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 110  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 132  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 161  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 170  |1 01  |r https://e-pub.uni-weimar.de/opus4/frontdoor/deliver/index/docId/3714/file/Dissertation-Jakob-Wenzel-2017.pdf 
981 |2 213  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
981 |2 293  |1 01  |r http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140 
983 |2 32  |1 00  |8 00  |a ST 276 
983 |2 60  |1 01  |8 10  |a ho 
983 |2 63  |1 00  |8 00  |a Hb 5082 
983 |2 170  |1 00  |8 00  |a 04 
995 |2 22  |1 01  |a SUBolrd 
995 |2 23  |1 01  |a olr-d 
995 |2 60  |1 01  |a OLRD 
995 |2 63  |1 01  |a E-Book LF Opus 
995 |2 132  |1 01  |a OLR-DISS 
995 |2 161  |1 01  |a ORD 
995 |2 213  |1 01  |a ORD 
995 |2 293  |1 01  |a ORD 
998 |2 23  |1 01  |0 2018-01-05:08:40:17