期刊文献+

基于改进MD5算法的数据篡改检测方法 被引量:5

Method of data tamper detection by using improved MD5 algorithm
下载PDF
导出
摘要 针对数据库中敏感数据被非法篡改后难以检测发现的问题,提出了一种基于单向散列算法的不可逆性对敏感数据篡改的有效检测方法,并采用检测客户端与服务器的双重检测机制来加强检测效果。单向散列算法选用MD5算法,并通过向算法中注入隐蔽的"抗体"因子以抵抗篡改者的穷举搜索,使MD5算法得到有效的改进。重点阐述了上述检测方法的原理及其在应用系统中的实现。应用结果表明,该检测方法对非法篡改具有高度敏感性和优秀的数据篡改检测性能。 This paper presents a method that can discover effectively the modification of sensitive data in database by using one-way hash algorithm that cannot be deduced inversely,because it is difficult to detect the illegal revision of sensitive data.The dual inspection approach is adopted through checking client and server for better detection effect.The MD5 algorithm,a one-way hash algorithm,is improved availably by adding a hidden 'antibody' factor to the algorithm for withstanding cribber's exhaustion search.The paper mainly describes the principle of this method based on the improved MD5 algorithm and how to realize it in the application system.Applied results demonstrate that this method has highly sensitive to intentional tampering and outstanding detection performance for data tamper detection.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第33期148-150,共3页 Computer Engineering and Applications
基金 云南省大型科学仪器 设备协作公用网及服务平台(No.2006PT06)。
关键词 散列算法 MD5算法 敏感数据 篡改检测 hash algorithm MD5 sensitive data tamper detection
  • 相关文献

参考文献6

  • 1唐承亮,肖海青,向华政.基于文字RGB颜色变化的脆弱型文本数字水印技术[J].计算机工程与应用,2005,41(36):6-8. 被引量:21
  • 2王艳辉,王相海.用于图像认证的数字水印技术综述[J].计算机工程与应用,2007,43(2):33-37. 被引量:16
  • 3Rivest R.Network Working Group RFC 1321,MD5 message-digest algorithm[S]. 1992-04 : 1-21.
  • 4Mead S.Unique file identification in the national software reference library[J].Digital Investigation, 2006,3 (3) : 138-150.
  • 5Cid C.Recent developments in cryptographic hash function: Security implications and future directions[R].Information Security Technical Report, 2006,11 (2) : 100-107.
  • 6Snodgrass R T,Yao S S,Collberg C.Tamper detection in audit logs[C]// Proceedings 2004 VLDB Conference, 2004: 504-515.

二级参考文献8

  • 1侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3Jiri Fridrich,Miroslav Goljan,Amold C Baldoza.New fragile authentication watermark for images[C].In:A C Image Processing,2000 Proceedings,2000 International Conference on,2000; 1:446-449
  • 4Phen-Lan Lin,Po-Whei Huang,An-Wei Peng.A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery[C].In:Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering(ISMSE'04),2004
  • 5Ebroul Izquierdo.A Technique for Secure Image Authentication[C].In:46th International Symposium Electronics in Marine,ELMAR-2004,2004:67-73
  • 6Atallah M J,V Raskin,C F Hempelmann et al.Natural Language Watermarking and Tamperproofing[C].In:I S Moskowitz ed.Information Hiding:5th International Workshop,IH,2002
  • 7I J Cox,J Kilian,T Leighton et al.Secure Spread Spectrum Watermarking for multimedia[J].IEEE Trans,1997; IP6(12):1673-1687
  • 8张小华,孟红云,刘芳,焦李成.一类有效的脆弱型数字水印技术[J].电子学报,2004,32(1):114-117. 被引量:22

共引文献35

同被引文献29

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部