期刊文献+

链接变量循环的Hash函数结构

Chaining variable rotative Hash function construction
下载PDF
导出
摘要 现有的Hash函数基本上都是根据Merkle-Damg°ard结构设计的。基于Merkle-Damg°ard结构易受到长度扩展攻击、多碰撞攻击、Herding攻击等这些缺陷,设计了一种链接变量循环的Hash结构,该结构是基于宽管道Hash结构的,具有大的内部状态,可以有效抵抗上述针对Merkle-Damg°ard结构的攻击。结构具有可分析的安全性,可以提高Hash函数的性能,尤其是基于数学困难问题的Hash算法,增加了消息块对Hash值的作用。 Most of Hash function is designed according to Merkle-Damg°ard construction.Merkle-Damg°ard construction suffers from length-extension attacks, multi-collision attacks, Herding attacks and so on.A chaining variable rotative Hash function construction is designed,which based on wide-wipe Hash construction,has big internal states and can resist length-extension attacks, multi-collision attacks and Herding attacks.Chaining variable rotative Hash function construction can improve the performance of Hash function, especially the Hash function based on difficult mathematical problems, and security can be analyzed,while increasing the role of message block to Hash value.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第20期53-55,61,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60873268) 陕西省教育厅科学研究计划项目(No.09JK678) 西安理工大学博士基金项目(No.116210902)~~
关键词 HASH函数 Merkle-Damg°ard结构 链接变量 多碰撞攻击 Herding攻击 Hash function Merkle-Damg°ard construction chaining variable multi-collision attack Herding attack
  • 相关文献

参考文献10

  • 1杨波.现代密码学[M].2版.北京:清华大学出版社,2007.
  • 2Damg*ard I.A design principle for Hash functions[C]//LNCS 435: Advances in CRYPTO 89.Berlin: Springer-Verlag, 1989 : 416-427.
  • 3Sholer N.Abacus:a candidate for SHA-3[Z].2008.
  • 4Joux A.Multicollisions in iterated Hash functions[C]//LNCS 3152: Advances in Cryptology-CRYPTO 2004.Berlin: Springer-Verlag, 2004:306-316.
  • 5Kelsey J, Schueier B.Second preimages on n-bit Hash functions for much less than 2n work[C]//LNCS 3494:Advances in Cryptology-Eurocrypt ' 2005 .Berlin: Springer-Verlag, 2005: 474-490.
  • 6Kelsey J, Kolmo T.Herding Hash functions and the Nostradamus attaek[C]//LNCS 4004: EUROCRYPT.Berlin: Springer-Verlag,2006:183-220.
  • 7Lucks S.Design principles for iterated Hash functions[R].Cryptology ePrint archive,2004.
  • 8Biham E,Dunkelman O.A framework for iterative Hash functionsHAIFA[R].Cryptology ePrint Archive, 2008.
  • 9Dean R D.Formal aspects of mobile code security[D].Princeton: Princeton University, 1999.
  • 10Saphir projeet.Shabal, a submission to NIST's cryptographic Hash algorithm competifion[EB/OL]. ( 2008-10 ).http://www.shabal.com.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部