• Introduction
  • Paper Title (use style: paper title)




    Download 32,91 Kb.
    bet1/7
    Sana13.06.2024
    Hajmi32,91 Kb.
    #263324
      1   2   3   4   5   6   7
    Bog'liq
    A.javohir


    Methods for Analyzing the Collision Tolerance of Modern Hash Function Algorithms

    Salayev Alisher Kuralbayevich dept. Information security
    Urgench Branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
    Urgench, Uzbekistan
    salayevalisher@gmail.com

    Aminboyev Javohir Alisher o’g’li dept. Information security


    Urgench Branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
    Urgench, Uzbekistan
    aminboyevjavohir2323@gmail.com

    Khaitbayev Azizbek Pirnazarovich


    dept. Information security
    Urgench Branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
    Urgench, Uzbekistan
    khaitboyev.a@gmail.com

    Introduction: Modern hash functions like SHA-256 and BLAKE2 are meticulously designed to be highly collision-resistant, making it computationally infeasible to find collisions, thereby safeguarding the integrity of processed data. However, ensuring their effectiveness necessitates employing rigorous analysis methods to assess their security against potential attacks. This thesis explores various approaches used to analyze the collision tolerance of contemporary hash functions, highlighting their strengths and limitations.
    Keywords: Hash function, collision resistance, cryptanalysis, cryptographic algorithms, differential cryptanalysis, empirical analysis, distribution analysis, collision finding experiments, correlation analysis, statistical modeling, randomness testing, SHA-256, BLAKE2.

    1. Introduction


    Modern hash functions like SHA-256 and BLAKE2 are meticulously designed to be highly collision-resistant, making it computationally infeasible to find collisions, thereby safeguarding the integrity of processed data. However, ensuring their effectiveness necessitates employing rigorous analysis methods to assess their security against potential attacks. This thesis explores various approaches used to analyze the collision tolerance of contemporary hash functions, highlighting their strengths and limitations.

    Download 32,91 Kb.
      1   2   3   4   5   6   7




    Download 32,91 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Paper Title (use style: paper title)

    Download 32,91 Kb.