The trend of the design principle of cryptographic primitives has changed enormously throughout time to serve the obligation of evolved technologies. I survey these changes and focus on certain decisions taken in the design of these cryptographic primitives through various ages of cryptography, classical, modern and quantum ages. I focus extensively on modern cryptographic primitives, in whom their security is based on the hardness of solving the underlying intractable problems, mainly the Integer Factorization. We show that most common cryptographic protocols are theoretically related and a threat on one protocol poses security threats on the other protocols. Moreover, theoretical quantum computing stabilization and more practical advances, along with Shor's algorithm threatens the current National Security Administration (NSA) standardized protocol (RSA). I intend to look closely into quantum limitation by discussing two well-known intractable problems from the graph theory. These problems are the Graph Isomorphism, and Hamiltonian Path. The later problems are studied in terms of suitability for cryptographic design and I provide a preliminary prototype to hide secrets based on them, and is believed to confound Quantum computing power.
|Commitee:||Bogdan, Chlebus, Ferrara, Michael|
|School:||University of Colorado at Denver|
|School Location:||United States -- Colorado|
|Source:||MAI 52/04M(E), Masters Abstracts International|
|Keywords:||Communication security, Cryptography, Intractable problems, Quantum cryptography, Quantum resistant cryptography, RSA|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be