Hash Based Encryption Schemes Using Physically Unclonable Functions

Dina Ghanai Miandaob, Duane Booher, Bertrand Cambou, Sareh Assiri

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In recent years public key cryptography has been revolutionary developed in cryptosystems. Algorithms such as RSA, ECC and DSA are commonly used as public key cryptography in a variety of applications. The drawback of these protocols is vulnerability against quantum computing. These protocols rely on the computational hardness of finding factorization but Peter Shor has proved that quantum computing can break all the public key cryptosystems that are relying on this factorization. Hash-Based Cryptography has been subject of debates for past few decades since it is known to be resistant to quantum computer attacks and there have been some advancements over this field. But all the available methods are concentrated on the digital signature schemes. None of them have the ability to encrypt and decrypt a plain text. This paper will describe some methods that can be used as encryption and decryption of plain text using hash functions.

Original languageEnglish (US)
Title of host publicationIntelligent Computing - Proceedings of the 2022 Computing Conference
EditorsKohei Arai
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages15
ISBN (Print)9783031104664
StatePublished - 2022
EventComputing Conference, 2022 - Virtual, Online
Duration: Jul 14 2022Jul 15 2022

Publication series

NameLecture Notes in Networks and Systems
Volume508 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389


ConferenceComputing Conference, 2022
CityVirtual, Online


  • Cryptography
  • Hash functions
  • Physically unclonable functions
  • Public key cryptography

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications


Dive into the research topics of 'Hash Based Encryption Schemes Using Physically Unclonable Functions'. Together they form a unique fingerprint.

Cite this