Show simple item record

dc.contributor.authorMashatan, Atefeh
dc.date.accessioned2008-12-02 17:20:08 (GMT)
dc.date.available2008-12-02 17:20:08 (GMT)
dc.date.issued2008-12-02T17:20:08Z
dc.date.submitted2008-11-27
dc.identifier.urihttp://hdl.handle.net/10012/4122
dc.description.abstractWe propose a formal model for non-interactive message authentication protocols (NIMAPs) using two channels and analyze all the attacks that can occur in this model. Further, we introduce the notion of hybrid-collision resistant (HCR) hash functions. This leads to a new proposal for a NIMAP based on HCR hash functions. This protocol is as efficient as the best previous NIMAP while having a very simple structure and not requiring any long strings to be authenticated ahead of time. We investigate interactive message authentication protocols (IMAPs) and propose a new IMAP, based on the existence of interactive-collision resistant (ICR) hash functions, a new notion of hash function security. The efficient and easy-to-use structure of our IMAP makes it very practical in real world ad hoc network scenarios. We also look at message recognition protocols (MRPs) and prove that there is a one-to-one correspondence between non-interactive MRPs and digital signature schemes with message recovery. Further, we look at an existing recognition protocol and point out its inability to recover in case of a specific adversarial disruption. We improve this protocol by suggesting a variant which is equipped with a resynchronization process. Moreover, another variant of the protocol is proposed which self-recovers in case of an intrusion. Finally, we propose a new design for message recognition in ad hoc networks which does not make use of hash chains. This new design uses random passwords that are being refreshed in each session, as opposed to precomputed elements of a hash chain.en
dc.language.isoenen
dc.publisherUniversity of Waterlooen
dc.subjectCryptographyen
dc.subjectmessage authenticationen
dc.subjectTwo-channel cryptographyen
dc.titleMessage Authentication and Recognition Protocols Using Two-Channel Cryptographyen
dc.typeDoctoral Thesisen
dc.pendingfalseen
dc.subject.programCombinatorics and Optimizationen
uws-etd.degree.departmentCombinatorics and Optimizationen
uws-etd.degreeDoctor of Philosophyen
uws.typeOfResourceTexten
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages