Date of Degree
cryptography; hash functions; information security
We present evidence why the Burnside groups of exponent 3 could be a good candidate for a platform group for the HKKS semidirect product key exchange protocol. We also explore hashing with matrices over SL2(Fp), and compute bounds on the girth of the Cayley graph of the subgroup of SL2(Fp) for specific generators A, B. We demonstrate that even without optimization, these hashes have comparable performance to hashes in the SHA family.
Bromberg, Lisa, "Some applications of noncommutative groups and semigroups to information security" (2015). CUNY Academic Works.