期刊文献+

一种基于分组密码的hash函数的安全性分析及构造 被引量:4

Construction and Analysis of Hash Function Based on Block Cipher
下载PDF
导出
摘要 利用已有的分组密码构造hash函数是一种非常方便的构造方法。早在1993年Preneel等人就对使用分组密码构造的64种hash函数进行了安全分类,这些hash函数统称为PGV体制,它们都是单倍分组长度的,即输出长度和分组长度相同。2002年Black在他的论文中对这64种hash函数的安全性进行了严格的证明,证明其中的20种是安全的,其他是不安全的。随着计算技术的发展,人们感到单倍分组长度的hash函数的安全性不足,于是一些双倍分组长度的基于分组密码的hash函数被提了出来。但是其中的很多是不安全的。在AsiaCrypt2006上,一种使用了5个分组密码的双倍分组长度的hash函数被提了出来。作者声明这种构造方式是安全的,但没有给出安全性证明。本文对该体制进行了分析,发现其安全性并不理想,并针对本文的攻击提出了一种新的基于分组密码的hash函数,同时和SHA-256等hash函数的性能进行了对比。 It is convenient to build hash functions on block ciphers. In 1993, Preneel etc. analyzed the security of 64 hash functions based on block ciphers which are single-block-length and named PGV schemes. In 2002, Black etc. formally proved the security of 64 PGV schemes. It is shown that 20 of them are secure and the others are not. With the development of computation technique, the security of single-block-length hash functions is not enough, therefore, some double- block-length schemes are proposed, however, many of them are not secure. In AsiaCrypt2006, a kind of hash function based on five block ciphers was proposed and it was claimed secure without security proofs. It is shown that the security of the scheme based on five block ciphers is not ideal. In this paper,a new hash function based on block ciphers is proposed and its efficiency is compared with SHA-26's.
出处 《计算机科学》 CSCD 北大核心 2008年第9期129-132,共4页 Computer Science
关键词 HASH函数 分组密码 生日攻击 Hash function,Block cipher,Birthday attack
  • 相关文献

参考文献11

  • 1Damgard I B. A design principle for hash functions ff Advances in Cryptology-Crypto' 89, LNCS 435. Springer-Verlag, 1989: 416-427
  • 2Preneel B, Govaerts R, Vandewalle J. Hash functions based on block ciphers: A synthetic approach//Advances in Cryptology- Crypto' 93, LNCS 773. Springer-Verlag, 1994: 368-378
  • 3Black J, Rogaway P, Shrimpton T. Black-box analysis of the block-cipher based hash function constructions from PGVff Advances in Cryptology-Crypto'02, LNCS 2442. Springer-Verlag, 2002 : 320-335
  • 4Merlde R. One way hash functions and DES// Advances in Cryptology-Crypto' 89, LNCS 435. Springer-Verlag, 1989: 428-446
  • 5Lai Xuejia, Massey J. Hash functions based on block cipehersff Advance in Cryptology-EOROCRYPT' 92 Proceedings, LNCS 658. Springer-Verlag, 1993: 55-70
  • 6Knudsen L, Lai X, Preneel B. Attacks on fast double block length hash functions. Journal of Cryptology, 1998,11 (1)
  • 7Nandi M,Lee W,Sakurai K, et al. Security analysis of a 2/3-rate double length compression function in the black-box model// FSE2005, LNCS 3557. ENSTA, 2005 : 243-254
  • 8Shannon C. Communication theory of secrecy systems. Bell Systems Technical Journal, 1949 : 656-715
  • 9Peyrin T,Gilbert H, Muller F, et al. Combining Compression Functions and Block Cipher-Based Hash. Asiaerypt2006
  • 10Brachtl B, Coppersmith D, Hyden M, et al. Data authentication using modification detection codes based on a public one way encryption function. U. S. Patent Number 4,908,861, March 1990

同被引文献20

  • 1张文涛.分组密码的分析与设计[D].北京:中国科学院,2004.
  • 2吴文玲,冯登国,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2000.
  • 3TOM S D,SIMON J.程序员密码学[M].沈晓斌,译.北京:机械工业出版社,2007.
  • 4Wen-Guey Tzeng,Chi-Ming Hu.A New Approach for Visual Cryptography[J]. Designs, Codes and Cryptography . 2002 (3)
  • 5Carlo Blundo,Annalisa De Bonis,Alfredo De Santis.Improved Schemes for Visual Cryptography[J]. Designs, Codes and Cryptography . 2001 (3)
  • 6Ching-Nung Yang.A Note on Efficient Color Visual Encryption. Journal of Information Science and Engineering . 2002
  • 7D. Q. Viet,,K. Kurosawa.Almost ideal contrast visual cryptography with reversing. Lecture Notes in Computer Science . 2004
  • 8D. Jin,W.-Q. Yan,M S. Kankanhalli."Progressive color visual cryptography,". Journal of Electrocardiology . 2005
  • 9邓绍江,廖晓峰,肖迪.一种基于混沌的可并行Hash函数[J].计算机科学,2008,35(6):217-219. 被引量:3
  • 10牛夏牧,焦玉华.感知哈希综述[J].电子学报,2008,36(7):1405-1411. 被引量:98

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部