Security Analysis of Cryptographic Primitives Used in Blockchain
| dc.contributor.author | Das, Atosi | |
| dc.date.accessioned | 2025-02-18T10:14:27Z | |
| dc.date.available | 2025-02-18T10:14:27Z | |
| dc.date.issued | 2024-06 | |
| dc.description | Dissertation under the guidance of Sc. Shantanu and Prof. Goutam K. Paul | en_US |
| dc.description.abstract | This thesis conducts a comprehensive security analysis of cryptographic primitives within the context of blockchain technology, focusing on MD5, Elliptic Curve Cryptography (ECC), and digital signatures. The first objective was to evaluate the security of MD5. The analysis revealed that MD5, once widely used, is vulnerable to collision attacks, leading to its deprecation in favor of more secure hash functions like SHA-256 for blockchain applications. | en_US |
| dc.identifier.citation | 38p. | en_US |
| dc.identifier.uri | http://hdl.handle.net/10263/7522 | |
| dc.language.iso | en | en_US |
| dc.publisher | Indian Statistical Institute, Kolkata | en_US |
| dc.relation.ispartofseries | Dissertation;;CrS;22-02 | |
| dc.subject | Hash functions | en_US |
| dc.subject | MD5 | en_US |
| dc.subject | SHA256 | en_US |
| dc.subject | Public-key cryptography | en_US |
| dc.subject | Elliptic curve | en_US |
| dc.subject | Digital Signature | en_US |
| dc.title | Security Analysis of Cryptographic Primitives Used in Blockchain | en_US |
| dc.type | Other | en_US |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- AtosiDas_CRS2202-2024.pdf
- Size:
- 2.67 MB
- Format:
- Adobe Portable Document Format
- Description:
- Dissertations - M Tech (CRS)
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
