• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Fuzzy Fingerprinting

Strobel, Cornelia 03 February 2005 (has links) (PDF)
Fingerprints play an important role in biometrics and cryptography. Their creation might be based on one-way hash functions, which should usually also be collision-resistant. But users tend to draw less attention at those fingerprints - so an attacker might hand out a similar fingerprint in order to spoof identity. The main ideas for creating such 'fuzzy fingerprints' and the creation algorithm itself are discussed in this lecture. The demonstration of the tool, that produces fuzzy fingerprints shows the practical background of this technique. / Fingerabdrücke besitzen sowohl in der Kryptographie als auch in der Biometrie eine große Bedeutung. In kryptographischen Anwendungen werden diese durch Einweg-Hash-Verfahren erzeugt, die für bestimmte Anwendungen auch kollisionsresitent sein müssen. In der Praxis schenken Benutzer diesen Fingerprints weit weniger Aufmerksamkeit - oft genügt es nur hinreichend ähnliche Fingerprints auszugeben, um die Nutzer zu täuschen Die Kriterien, die dabei erfüllt sein müssen und die Erzeugung dieser "Fuzzy Fingerprints" sind Hauptbestandteil dieses Vortrags. Durch die Demonstration eines Tools im praktischen Einsatz wird dieser abgeschlossen.
2

Application of Huffman Data Compression Algorithm in Hashing Computation

Devulapalli Venkata,, Lakshmi Narasimha 01 April 2018 (has links)
Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005]. The purpose of this study is to apply Huffman data compression algorithm to the SHA-1 hash function in cryptography. Huffman data compression algorithm is an optimal compression or prefix algorithm where the frequencies of the letters are used to compress the data [Huffman, 1952]. An integrated approach is applied to achieve new compressed hash function by integrating Huffman compressed codes in the core functionality of hashing computation of the original hash function.
3

Fuzzy Fingerprinting

Strobel, Cornelia 03 February 2005 (has links)
Fingerprints play an important role in biometrics and cryptography. Their creation might be based on one-way hash functions, which should usually also be collision-resistant. But users tend to draw less attention at those fingerprints - so an attacker might hand out a similar fingerprint in order to spoof identity. The main ideas for creating such 'fuzzy fingerprints' and the creation algorithm itself are discussed in this lecture. The demonstration of the tool, that produces fuzzy fingerprints shows the practical background of this technique. / Fingerabdrücke besitzen sowohl in der Kryptographie als auch in der Biometrie eine große Bedeutung. In kryptographischen Anwendungen werden diese durch Einweg-Hash-Verfahren erzeugt, die für bestimmte Anwendungen auch kollisionsresitent sein müssen. In der Praxis schenken Benutzer diesen Fingerprints weit weniger Aufmerksamkeit - oft genügt es nur hinreichend ähnliche Fingerprints auszugeben, um die Nutzer zu täuschen Die Kriterien, die dabei erfüllt sein müssen und die Erzeugung dieser "Fuzzy Fingerprints" sind Hauptbestandteil dieses Vortrags. Durch die Demonstration eines Tools im praktischen Einsatz wird dieser abgeschlossen.

Page generated in 0.0599 seconds