期刊文献+

一组完整性校验算法及其效率分析 被引量:2

A set of integrality verify algorithms and efficiency analysis
下载PDF
导出
摘要 完整性校验算法在检查系统完整性上扮演着重要角色.本文详细讨论几种完整性校验算法:MD5、RIPEMD-128、RIPEMD-160.结合实际测试,分析了它们的执行效率和算法的优缺点.最后得出结论——RIPEMD160应是一种现在和将来一段时间内的首选算法. Integrality Verify Algorithm,as a method that checks up the coincidence and integrality of the system,plays an important role.Kinds of algorithms such as MD5、RIPEMD-128、RIPEMD-160 are discussed in detail.Combined with the series of actual tests,the execution efficiency of these algorithm performances is analysed in the paper,and the conclusion is that RIPEMD-160 should be one of the first considerated in future.
作者 单红
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2007年第5期28-31,共4页 Journal of Anhui University(Natural Science Edition)
关键词 MD5 RIPEMD-128 RIPEMD-160 单向散列函数 MD5 RIPEMD-128 RIPEMD-160 one-way hashing function
  • 相关文献

参考文献6

二级参考文献34

  • 1[1]CAI Liang, YANG Xiao - Hu, DONG Jin - Xiang, Thread Analysis and Security Protection for Malicious DMBS, ICYCS 2001.
  • 2[2]S. Bakhtiari, R. Safavi - Naini and J. Pieprzyk, "Keyed Hash Functions",Cryptography: Policy and Algorithms, Sprinter - Verlag, 1996, pp. 201~214.
  • 3[3]Colin Boyd, "A Class of Flexible and Efficient Key Management Protocols"IEEE, 1996.
  • 4[4]S.M. Bellovin and M. Merrit, "Limitations of the Kerberos Protocol"Winter 1991 USENIX Conference Proceedings, USENIX Association, 1999, pp. 253~267.
  • 5[5]Douglas Maughan, Mark Schertler, Mark Schneider, and Jeff Turner, Intemet Security Association and Key Management Protocol( ISAKMP). Intemet-draft, IPSEC Working Group,June 1996.
  • 6[6]C.Meadows,Applying formal methods to the analysis of a key management protocol, Joumal of Computer Security, 1(1 )5 - 36,1992.
  • 7[7]A. Aziz, M. Patterson, and G. Baehr, Simple Key- Management for Internet Protocols(SKIP), In Proceedings of the Internet Society International Netwoking Conference, June 1995.
  • 8[8]R. Rivest, The MD5 Message Digest Algorithm RFC 1321 April 1992, Networking Group. MIT Laboratory for Computer Science and RSA Data Security Inc.
  • 9Stinson Douglas R. Cryptography Theory and Practice[M].CRC Press Publishing House of Electronics Industry,2003.
  • 10Biham E,Shamir A.Differential cryptanalysis of the data encryption standard.Springer-Verlag,1993.

共引文献16

同被引文献20

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部