期刊文献+

基于Hash函数加密方法的安全性研究 被引量:3

Improve the Security of Cryptography Base on Hash Function
下载PDF
导出
摘要 针对目前还在普遍使用的公共加密方法,阐述其不安全性,介绍了几种安全的高强度的公共加密方法,并给出了实践中的算法. Described the fatalness of public cryptography based on Hash function, introduce some high security cryptography. Finally, propose the algorithm of SHA- 512.
作者 羊裔高
出处 《河北师范大学学报(自然科学版)》 CAS 北大核心 2009年第3期313-317,共5页 Journal of Hebei Normal University:Natural Science
关键词 HASH函数 SHA加密 MD5加密 安全性 Hash function SHA MD5 security
  • 相关文献

参考文献2

  • 1WANG Xiao-yun,FENG Deng-gou,LAI Xue-jia,et al.Collisions for Hash Functions MD4,MD5,HAVAL2128 and RIPEMD[EB/OL] http://eprint.iacr.org/2004/199,2005-01-01.
  • 2李超,魏悦川,孙兵.SHA-256压缩函数的结构安全性[J].应用科学学报,2008,26(1):1-5. 被引量:3

二级参考文献10

  • 1WANG Xiaoyun, FENG Denggou, LAI Xuejia, YU Hongbo.Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD [C]//Rump Session of Crypto' 04 and IACR ePrint Archive, August 2004.
  • 2WANG Xiaoyun, YU Hongbo. How to break MD5 and other Hash functions [ C]//Advances in Cryptology - Eurocrypt'05, Lecture Notes in Computer Science, 2005, 3494 : 19 - 35.
  • 3WANG Xiaoyun, YU Hongbo. Efficient collision search attacks on SHA-0 [ C ]//Advances in Cryptology-Crypto' 05, Lecture Notes in Computer Science, 2005,3621 : 1 - 16.
  • 4WANG Xiaoyun. Finding collisions in the full SHA-1 [ C ]//Advances in Cryptology-Crypto05, Lecture Notes in Computer Science, 2005,3621:17 -36.
  • 5Nalional Institute of Standards and Technology. Secure Hash Standard (SHS)[ S]. Federal Information Processing Standards (FIPS) Publication, 2004, 180-2.
  • 6MATUSIEEICZ K, PIEPRZYK J, PRAMSTALLER N, RECHBERGER C, RIJMEN V. Analysis of simplied variants of SHA-256 [ C ]//In WEWoRC 2005 Western European Workshop in Cryptology, 2005 : 123 - 134.
  • 7YOSHIDA H, BIRYUKOV A. Analysis of a SHA-256 variant [C]//Selected Areas in Cryptography (SAC 2005 ), Kingston, Ontario, 2005:245 - 260.
  • 8GILBERT H, HANDSCHUH H. Security analysis of SHA-256 and sisters [C]//Selected Areas in Cryptography' 03, Lecture Notes in Computer Science, 2003, 3006:175 - 193.
  • 9CHABAUD F, Joux A. Differential collisions in SHA-0 [ C ]//Advances in Crypyology-CRYPYO ' 98, Lecture Notes in Computer Science, 1998,1462 : 56 - 71.
  • 10HAWKES P, PADDON M, ROSE G G. On corrective patterns for the SHA-2 family [EB/OL]. Cryptology ePrint Archive, August, 2004/207 [ 2006-10-01 ]. http:// eprint. iacr. org,/2004/207.

共引文献2

同被引文献23

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2Boneh D, DeMillo R A, Lipton R J. On the Importance of Checking Cryptographic Protocols for Faults [ C ]// EUROCRYPT 1997. [ s. l. ] :Springer, 1997:37-51.
  • 3Biham E,Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[C]// In: Kaliski Jr B S. CRYPTO 1997. [s. l.] :Springer, 1997:513 - 525.
  • 4Biehl I, Meyer B, Muller V. Differentialfauh analysis oil elliptic curve cryptosystems [C]//In : Bellare M. CRYPTO 2000. [s. l. ]:Springer, 2000:131 - 146.
  • 5Hemme L. A differential fault attack against early rounds of (Triple-) DES [C]// In: Joye M, Quisquater J J. CHES 2004. [s. l. ] :Springer, 2004:254 - 267.
  • 6Piret G, Quisquater J J. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad[C]// In: Walter C D Koc cK, Paar C. CHES 2003. [ s. l. ] :Springer, 2003:77 88.
  • 7LI Wei, GU Dawu, LI Juanru. Differential fault analysis on the ARIA algorithm. Information Sciences[ J]. Elsevier Inc, 2008,178(19) :3727 - 3737.
  • 8ZHAO Xin-jie, WANG Tao. An Improved Differential Fault Attack on Camellia [ EB/OL ]. 2009. Cryptology ePrint Archive, http://eprint. iacr. org/2009/585.
  • 9Hoeh J J, Shamir A. Fault analysis of stream ciphers[C]// In: Joye M, Quisquater J J. CHES 2004. [s. l.] :Springer, 2004 : 240-253.
  • 10Hojsik M, Rudolf B. Floating fault analysis of Trivium [C]// In:Chowdhury D R, Rijmen V, Das A. INDOCRYPT 2008. [s. l.] :Springer, 2008:239-250.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部