Digital Signature Schemes Based on Hash Functions
dc.contributor.author | Lafrance, Philip | |
dc.date.accessioned | 2017-04-19T16:07:10Z | |
dc.date.available | 2017-04-19T16:07:10Z | |
dc.date.issued | 2017-04-19 | |
dc.date.submitted | 2017-04-11 | |
dc.description.abstract | Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available. Most of the public-key cryptosystems employed today on the Internet, in both software and in hardware, are based on number-theoretic problems which are thought to be intractable on a classical (non-quantum) computer and hence are considered secure. The most popular such examples are the RSA encryption and signature schemes, and the Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol employed widely in the SSL/TLS protocols. However, these schemes offer essentially zero security against an adversary in possession of a large-scale quantum computer. Thus, there is an urgent need to develop, analyze and implement cryptosystems and algorithms that are secure against such adversaries. It is widely believed that cryptographic hash functions are naturally resilient to attacks by a quantum adversary, and thus, signature schemes have been developed whose security relies on this belief. The goal of this thesis is to give an overview of hash-based cryptography. We describe the most important hash-based signature schemes as well as the schemes and protocols used as subroutines within them. We give a juxtaposition between stateful and stateless signature schemes, discussing the pros and cons of both while including detailed examples. Furthermore, we detail serious flaws in the security proof for the WOTS-PRF signature scheme. This scheme had the feature that its security proof was based on minimal security assumptions, namely the pseudorandomness of the underlying function family. We explore how this flawed security argument affects the other signature schemes that utilize WOTS-PRF. | en |
dc.identifier.uri | http://hdl.handle.net/10012/11679 | |
dc.language.iso | en | en |
dc.pending | false | |
dc.publisher | University of Waterloo | en |
dc.subject | Cryptography | en |
dc.subject | Quantum-resistance | en |
dc.subject | Digital Signatures | en |
dc.title | Digital Signature Schemes Based on Hash Functions | en |
dc.type | Master Thesis | en |
uws-etd.degree | Master of Mathematics | en |
uws-etd.degree.department | Combinatorics and Optimization | en |
uws-etd.degree.discipline | Combinatorics and Optimization | en |
uws-etd.degree.grantor | University of Waterloo | en |
uws.comment.hidden | Any required paper work you may need is in the mail. Contact Melissa Cambridge in C&O if there is an issue with missing paperwork please. Also. Have yourself a fine day. | en |
uws.contributor.advisor | Menezes, Alfred | |
uws.contributor.affiliation1 | Faculty of Mathematics | en |
uws.peerReviewStatus | Unreviewed | en |
uws.published.city | Waterloo | en |
uws.published.country | Canada | en |
uws.published.province | Ontario | en |
uws.scholarLevel | Graduate | en |
uws.typeOfResource | Text | en |