期刊文献+

A Fast Pseudorandom Number Generator with BLAKE Hash Function

A Fast Pseudorandom Number Generator with BLAKE Hash Function
原文传递
导出
摘要 This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program. This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology) Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2010年第5期393-397,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) ( 2007AA01Z411) the National Natural Science Foundation of China ( 60673071, 60970115 )
关键词 CRYPTOGRAPHY pseudorandom number generator hash function National Institute of Standards and Technology Statistical Test Suite cryptography pseudorandom number generator hash function National Institute of Standards and Technology Statistical Test Suite
  • 相关文献

参考文献16

  • 1Ballet S, Rolland R. A note on Yao's theorem about pseudorandom generators [EB/OL]. [2010-01-01]. http://eprint. iacr. org/2009/548.
  • 2Steinfeld R, Pieprzyk J, Wang H X. On the provable security of an efficient RSA-based pseudorandom generator [EB/OL]. [2010-02-01]. http://eprint, iacr.org/2006/206.
  • 3Wang X Y, Yin Y L, Yu H. Finding collisions in the full SHA-1[C]//Proceeding of CRYPTO 2005. Berlin: Springer- Verlag, 2005: 17-36.
  • 4Wang X, Yu H. How to break MD5 and other hash functions[C]//Proceeding of Eurocrypt 2005. Berlin: Springer-Verlag, 2005: 19-35.
  • 5Wang X, Feng D, Lai X. Collisions for hash functions MD4, MD5, HAVAL-128 and R1PEMD[C] //Proceeding of Crypto 2005. Berlin: Springer-Verlag, 2004: 54-67.
  • 6Yu H B, Wang X Y. Distinguishing attack on the secret-prefix MAC based on the 39-step SHA-256[C]// Proceedings of ACISP 2009. Berlin: Springer-Verlag, 2009: 185-201.
  • 7Yuan Z, Wang W, Jia K T, et al. New birthday attacks on some MACs based on block ciphers[C]//Proceedings of CRYPTO 2009. Berlin: Springer-Verlag, 2009: 209-230.
  • 8Beuchat J L, Okamoto E, Yamazaki T. Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA[EB/OL]. [2010-02-01]. http : //eprint.iacr. org/2010/173.
  • 9NIST. Plan for new cryptographic hash functions[EB/OL]. [2009-10-12]. http : //www.nist.go v/hash -function/.
  • 10Vidali J, Nose P, Pasalic E. Collisions for variants of the BLAKE hash function[J]. Information Processing Letters, 2010, (7): 585-590.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部