Please use this identifier to cite or link to this item:
http://hdl.handle.net/10263/7522
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Das, Atosi | - |
dc.date.accessioned | 2025-02-18T10:14:27Z | - |
dc.date.available | 2025-02-18T10:14:27Z | - |
dc.date.issued | 2024-06 | - |
dc.identifier.citation | 38p. | en_US |
dc.identifier.uri | http://hdl.handle.net/10263/7522 | - |
dc.description | Dissertation under the guidance of Sc. Shantanu and Prof. Goutam K. Paul | en_US |
dc.description.abstract | This thesis conducts a comprehensive security analysis of cryptographic primitives within the context of blockchain technology, focusing on MD5, Elliptic Curve Cryptography (ECC), and digital signatures. The first objective was to evaluate the security of MD5. The analysis revealed that MD5, once widely used, is vulnerable to collision attacks, leading to its deprecation in favor of more secure hash functions like SHA-256 for blockchain applications. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Indian Statistical Institute, Kolkata | en_US |
dc.relation.ispartofseries | Dissertation;;CrS;22-02 | - |
dc.subject | Hash functions | en_US |
dc.subject | MD5 | en_US |
dc.subject | SHA256 | en_US |
dc.subject | Public-key cryptography | en_US |
dc.subject | Elliptic curve | en_US |
dc.subject | Digital Signature | en_US |
dc.title | Security Analysis of Cryptographic Primitives Used in Blockchain | en_US |
dc.type | Other | en_US |
Appears in Collections: | Dissertations - M Tech (CRS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AtosiDas_CRS2202-2024.pdf | Dissertations - M Tech (CRS) | 2.73 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.