期刊文献+

可用于哈希函数的安全迭代结构 被引量:3

Iterative Structure for Hash Function
下载PDF
导出
摘要 Merkle-Damgard(MD)迭代结构存在着不能保持压缩函数的第2原像稳固性、伪随机函数性等不安全性问题.为增强迭代哈希函数的安全性,从抵抗现有攻击的角度提出1个强化MD迭代结构,称为CMD结构.经证明,该结构可以保持压缩函数的抗碰撞性,能抵抗现有的对MD迭代结构的攻击,包括第2原像攻击和任意选定前缀的原像攻击.利用这些攻击方法对enveloped Merkle-Damgard结构进行了分析,并指出该结构不能提供比MD结构更高的安全性. Merkle-Damgard construction had been found that it could not preserve all of the properties of the compression function, such as the second preimage resistance property, pseudo random property etc. To improve the security of the iterative Hash function, an enhanced iterative construction, called CMD construction was proposed. This construction can maintain the collision resistance of the compression function. The analysis results show that it can resist the attacks on the Merkle-Damgard construction, including the second preimage attack and the herding attack. In addition, using these known attack methods, the security of the enveloped Merkle-Damgard construction is showed to be the same as that of the Merkle-Damgard construction.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第6期22-25,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家"973计划"项目(2007CB311203) 高等学校学科创新引智计划项目(B08004)
关键词 哈希函数 Merkle—Damgard迭代结构 多碰撞攻击 第2原像攻击 任意选定前缀的原像攻击 Hash function Merkle-Damgard iterative structure multi-collision attack preimage attack herding attack
  • 相关文献

参考文献14

  • 1Damg~.rd I. A design principle for Hash functions[ C]// Brassard G. Advances in CRYPTO'89. Berlin: Springer- Verlag, 1989: 416-427.
  • 2Merkle R. One way Hash functions and DES[C]//Brassard. Advances in CRYPTO'89. Berlin: Springer-Verlag, 1989: 428-446.
  • 3Joux A. Multicollisions in iterated Hash functions, application to cascaded constructions [ C ] /// Franklin M. Advances in Cryptology-CRYPTO 2004. Berlin: Springer-Verlag, 2004: 306-316.
  • 4Kelsey J, Sehneier B. Second preimages on n-bit Hash functions for much less than 2^n work[C]//Cramer R. Advances in Cryptology- EUROCRYPT 2005. Berlin; Springer-Verlag, 2005. 474-490.
  • 5Kelsey J, Kohno T. Herding Hash functions, the nostradamus attack[C]//Vaudenay S. Advances in Cryptology-EUROCRYPT 2006. Berlin: Springer-Verlag, 2006 : 183-200.
  • 6NIST. Announcing request for candidate algorithm nominations for a new cryptographic Hash algorithm (SHA-3) family [EB/OL]. 2007 (2007-11-02). http: //www. buslab.org/index2.php? option = com_ content&do pdf= 1&id= 186713.
  • 7Bellare M, Ristenpart T. Multi-property-preserving Hash domain extension and the EMD transform[ C]//Lai Xuejia, Chen Kefei. Advances in Cryptology-ASIACRYPT 2006. Berlin: Springer-Verlag, 2006: 299-314.
  • 8Gauravaram P, Millan W, Dawson E, et al. Constructing secure Hash functions by enhancing Merkle-Damgard construction[C]//Batten L M, Naini R S. The 11^th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2006 : 407-420.
  • 9Filho D G, Barreto P, Rijmen V. The Mael strom-0 Hash function[C]//Carmo L F. The 6^th Brazilian Symposium on Information and Computer System Security. Brazil: Brazilian Society for Computing, 2006: 328-337.
  • 10Duo Lei. New integrated proof method on iterated Hash structure and new structures[EB/OL]. 2006 (2006-11- 05). http://eprint.iacr. org/2006/147, pdf.

同被引文献7

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部