期刊文献+

基于Sponge结构的轻量级Hash函数设计 被引量:2

Design of Lightweight Hash Function Based on Sponge Structures
下载PDF
导出
摘要 随着物联网技术的高速发展、资源受限设备的广泛应用,传统密码算法正面临着新的挑战.除了要提供一定程度的安全保证外,资源受限环境下的Hash函数还面临着轻量化需求.提出一种基于Sponge结构的轻量级Hash函数,内部变换采用改进的Klein算法,并对其软件实现进行面对字节的优化,具有64位摘要长度.对算法进行依赖性测试和安全分析结果表明该算法可以满足资源受限环境的安全需求.效率测试表明该算法硬件实现规模满足资源受限环境的要求,并兼顾了软件实现效率. The rapid development of Internet and wide application of resource constrained devices means that traditional cryptographic algorithms for security problems are faced new challenges. In addition to providing a certain degree of security guarantee,Hash functions are also subject to lightweight requirements in resource-constrained environments. A lightweight Hash function based on Sponge structure is proposed in this paper,and the internal permutation is an improved Klein algorithm,and its software implementation is optimized by adopting byte-oriented implementation,with 64 bit of digest size. The dependency test and security analysis results show that the algorithm can meet the security requirements in a resource-constrained environment. The efficiency test shows that the hardware implementation scale of the algorithm meets the requirements in the resource-constrained system,and the efficiency of software implementation is also considered.
作者 赵太飞 尹航 李永明 ZHAO Tai-fei;YIN Hang;LI Yong-ming(Faculty of Automation and Information Engineering,Xi'an University of Technology,Xi'an 710048,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第12期2636-2639,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61772416)资助 陕西省教育厅产业化培育项目(17JF024)资助 西安市碑林区科技计划项目(GX1617)资助
关键词 HASH 轻量级 SPONGE KLEIN Hash lightweight Sponge Klein
  • 相关文献

参考文献2

二级参考文献45

  • 1王后珍,张焕国,伍前红,张雨,李春雷,张欣雨.多变量Hash函数的构造理论与方法[J].中国科学:信息科学,2010,40(10):1299-1311. 被引量:4
  • 2JP. Aumasson,L. Henzen,W. Meier, et al.QUARK: A Lightweight Hash. CHES2010 . 2010
  • 3A. Bogdanov,M. Knezevic,G. Leander,D. Toz,K. Varici,I. Verbauwhede.SPONGENT:A lightweight hash function. CHES . 2011
  • 4NAYA-PLASENCIA M,PEYRIN T.Practical cryptanalysis of ARMADILLO2. Fast Software Encryption . 2012
  • 5AO T,HE Z,RAO J,et al.A Compact Hardware Implementation of SM3 Hash Function. Trust,Security and Privacy in Computing and Communications (Trust Com),2014 IEEE 13th International Conference on . 2014
  • 6BERTONI G,DAEMEN J,PEETERS M.The Keccak sponge function family(ON)http://Keccak.noekeon.org/specs_summary.html . 2015
  • 7Martin Hell,Thomas Johansson,Willi Meier.Grain a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing . 2007
  • 8DINUR I,DUNKELMAN O,SHAMIR A.Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Fast Software Encryption . 2013
  • 9KUILA S,SAHA D,Pal M,et al.Practical distinguishers against 6-round keccak-f exploiting self-symmetry. Progress in Cryptology-AFRICACRYPT 2014 . 2014
  • 10AUMASSON J P,MEIER W.Analysis of multivariate hash functions. Information Security and Cryptology-ICISC 2007 . 2007

共引文献14

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部