Cryptography in Blockchain

There is a vast multitude of different hashing and cryptography algorithms out there, and more are developed every year. Blockchain technology, and crypto-currencies specifically, raised many concerns in different institutions. Users want to be sure that their assets are adequately protected by the best available algorithms, but some institutions around the world are opposed to that, or enforce their own standards. Ideally, every platform would allow its users to choose any algorithm they want, but in most situations this is, unfortunately, not the case. In this paper we present a review of the most popular blockchain platforms and the options they provide, and compare their cryptographic strength.

[1]  Florian Mendel,et al.  Improving Local Collisions: New Attacks on Reduced SHA-256 , 2013, EUROCRYPT.

[2]  Jian Guo,et al.  Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..

[3]  Christophe De Cannière,et al.  Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.

[4]  Amr M. Youssef,et al.  Fault Analysis of Kuznyechik , 2015, IACR Cryptol. ePrint Arch..

[5]  Shahram Khazaei,et al.  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.

[6]  Vincent Rijmen,et al.  On the Collision Resistance of RIPEMD-160 , 2006, ISC.

[7]  Hongjun Wu,et al.  Improving the Biclique Cryptanalysis of AES , 2015, ACISP.

[8]  Palash Sarkar,et al.  New Collision Attacks against Up to 24-Step SHA-2 , 2008, INDOCRYPT.

[9]  Yonglin Hao,et al.  The Boomerang Attacks on BLAKE and BLAKE2 , 2014, Inscrypt.

[10]  Bernard L. Menezes,et al.  Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[11]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[12]  Sasu Tarkoma,et al.  Networking and Messaging , 2012 .

[13]  Søren S. Thomsen An improved preimage attack on MD2 , 2008, IACR Cryptol. ePrint Arch..

[14]  Marc Stevens,et al.  The First Collision for Full SHA-1 , 2017, CRYPTO.

[15]  Lars R. Knudsen,et al.  Cryptanalysis of MD2 , 2009, Journal of Cryptology.

[16]  Jian Guo,et al.  Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak , 2017, CRYPTO.

[17]  Thomas Peyrin,et al.  The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function , 2014, Selected Areas in Cryptography.