期刊文献+

一种针对磁盘完整性校验的增量hash算法 被引量:2

An Incremental Hash Algorithm for Hard Disk Integrity Check
下载PDF
导出
摘要 增量hash函数具有传统迭代hash函数所不具备的增量性和并行性,可以使数据校验值的更新时间与该数据被修改的规模成比例。论文采用增量校验的思想,设计了一种针对磁盘完整性校验的hash函数称为iHash。该文介绍了算法的设计,描述了算法的具体实现,论证了其在抗碰撞问题上的可证明安全性,详细分析了该算法既具有一般增量hash算法的性能优势又具有之前增量hash设计领域未曾提出的新特性,最后给出了iHash与已有的hash函数在性能上的对比实验结果。 Compared with traditional hash functions,the incremental hash function has instrumentality and parallelizability.If data x is modified we don't need to compute its hash value from scratch.By incremental hash function,updating the old hash value to the new one is time proportional to the amount of modification made in x.Based on incremental hash paradigm we design a new kind of incremental hash function for hard disk integrity.We introduce the detail of this algorithm,discuss its provable security against collision-attack and then analyze some advantages of this hash function which is not issued before.Finally we indicate a set of experiment data compared with two existed hash functions,which will practically prove the advantages of iHash in performance.
出处 《微型电脑应用》 2009年第4期17-19,4,共3页 Microcomputer Applications
基金 国家高技术研究发展计划(863)(2006AA01Z446)
关键词 增量hash 可证明安全 碰撞问题 平衡问题 链表式计算结构 Incremental hash function Provable security,Collision-free Balance problem Chain table structure
  • 相关文献

参考文献5

  • 1M. Bellare, O. Goldreich and S. Goldwasser.Incremental cryptography: The case of hashing and signing[A].Lecture Notes in Computer Science [C]. 1994.
  • 2M. Bellare, O. Goldreich and S. Goldwasser.Incremental cryptography and application to virus protection [A].27^th ACM symposium on the Theory of Computing Proceedings[C].1995.
  • 3M. Bellare and P. Rogaway.XOR MACs: New methods for message authentication using fmte pseudorandom functions [A].Lecture Notes m Computer Science [C]. 1995.
  • 4Mihir Bellare, Daniele Mlcciancio.A New Paradigm for Collision-Free Hashing: Incremental at Reduced Cost [A].Lecture Notes in Computer Science. 1997.
  • 5B. M. Goi, M. U. Siddiqi and H. T. Chuah.Incremental hash function based on pair chaining & modular arithmetic combining [A]. Lecture Notes m Computer Science [C].2001.

同被引文献9

  • 1Paul Barham,Boris Dragovic,Keir Fraser,et al. Xen and the art of vir- tualization[ C]//Proeeedings of the nineteenth ACM symposium on op- erating systems principles,2003.
  • 2Murray D G, Milos G, Hand S. Improving Xen security through disag- gregation[ C]//Proeeedings of the fourth ACM SIGPLAN/SIGOPS in- ternational conference on Virtual execution environments,2008. Colp P, Nanavati M,Zhu J, et al. Breaking up is hard to do: security and functionality in a commodity hypervisor[ C]//Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles,2011.
  • 3Zhang F,Chen J, Cheu H, et al. CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization[ C]// Proceedings of the Twenty-Third ACM Symposium on Operating Sys- tems Principles, 2011.
  • 4Zhang F,Chen J, Chen H, et al. CloudVisor: Retrofitting protection of virtual machines in multl-tenant cloud with nested virtualization[ C]// Proceedings of the Twenty-Third ACM Symposium on Operating Sys- tems Principles, 2011.
  • 5Sandhu R S, Samarati P. Access control : principle and practice [ J ]. Communications Magazine, IEEE, 1994,32 (9) :40 - 48.
  • 6Sandhu R S,Coyne E J,Feinstein H L,et al. Role-based access control models [ J ]. Computer, IEEE, 1996,29 (2) :38 - 47.
  • 7Blaze M. A eryptographic file system for UNIX [ C ]//Proceedings of the 1 st ACM conference on Computer and communications security, 1993.
  • 8Wright C P,Martino M,Zadok E. NCryptfs: A secure and convenient cryptographic file system U C ]//Proceedings of the Annual USEN1X Technical Conference ,2003.
  • 9高伟,谷大武,侯方勇,宋宁楠.磁盘数据安全保护技术综述[J].计算机应用研究,2008,25(5):1288-1291. 被引量:8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部