Constructing Requirements of CHF based on graph & group theories (1/2)
5
Collision resistance.
6
Comparison with Cayley hash functions
7
Preliminaries
8
Triplet graph
9
An adjacency relation of sextet graph
10
Proposed hash (would) have no short collisions.
11
The underlying group H of the group word problem
12
Possible attacks
13
Performance
14
Summary & Problems
Description:
Explore a conference talk on cryptographic hash functions derived from arc-transitive graphs. Delve into the construction requirements, collision resistance, and comparisons with Cayley hash functions. Examine the triplet graph, adjacency relations of sextet graphs, and the underlying group H of the group word problem. Analyze potential attacks, performance considerations, and outstanding challenges in this cutting-edge area of cryptography.
Cryptographic Hash Functions from Arc-Transitive Graphs - Part 1