期刊文献+

分组密码安全散列算法压缩函数设计

Design of Compression Function of Block Cipher Secure Hash Algorithm
下载PDF
导出
摘要 为对抗穷举攻击和密码分析攻击,分析安全散列算法设计的基本准则。研究有限域运算及高强度对称分组密码的结构及其在安全散列算法压缩函数中的应用。以此为基础,设计一种安全散列算法。算法采用256比特的散列码长度,以有限域运算及位运算为基础操作,依据高强度对称分组密码结构,设计不可逆迭代压缩函数。针对应用于智能卡的8位CPU平台,指出算法高效实现的要点。 Analyses the basic criteria of a secure hash algorithm for resisting the brute-foree and crypt- analysis attacks. Studies the finite field operations and the structures of the strong symmetric block cipher, and the applications for compression function in secure hash algorithm. And on this basis designs a secure hash algorithm. According to structure of strong symmetric block cipher, designs the irreversible iterated compression function based on the operations of finite fields and bit, and uses the hash value of 256 bits in the algorithm. To 8-bit CPU platform of smart card, indicates the key points using for realizing algorithm efficiently.
出处 《现代计算机(中旬刊)》 2012年第11期3-7,10,共6页 Modern Computer
基金 河南省教育厅科技攻关项目(No.2007520033)
关键词 安全散列函数 压缩函数 对称分组密码 有限域 Secure Hash Function Compression Function Symmetric Block Cipher Finite Fields
  • 相关文献

参考文献13

  • 1Merkle, R.. One Way Hash Functions and DES [C]. Proceed- ings, CRYPTO'89, 1989; Published by Springer-Verlag.
  • 2Damgard, I. A Design Principle for Hash Functions[C]. Pro- ceedings, CRYPTO'89, 1989; Published by Springer-Verlag.
  • 3Stallings,W. Cryptography and Network Security:Principles and Practices[M]. Four Edition. Published by Pearson Educa- tion, Inc., 2006.
  • 4Barreto, P., Rijmen, V. The Whirlpool Hashing Function. Submitted to NESSIE, September 2000, Revised May 2003.
  • 5Van Oorschot, P., Wiener, M. Parallel Collision Search with Application to Hash Functions and Discrete Logarithms[C]. Proceedings, Second ACM Conference on Computer and Communications Security, 1994.
  • 6Wang, X., yu, H. How to Break MD5 and Other Hash Func- tions[C]. Proceedings, Advances in Cryptology- EUROCRYPT 2005; Published by Springer Berlin..
  • 7Wang, X., Yin, Y., Yu, H. Finding Collisions in the Full SHA-1 [C]. Proceedings, CRYPTO'05, 2005; Published by Springer-Verlag.
  • 8Daemen, J, Rijmen, V. The Design of Rijndael: The Wide Trail Strategy Explained [M]. New York, Springer-Verlag, 20O2.
  • 9Nechvatal, J., et al. Report on the Development of the Ad- vanced Encryption Standard [M]. National Institute of Stan- dards and Technology. October 2, 2000.
  • 10Preneel, B., Govaerta, R., Vandewalle, J. Hash Functions Based on Block Ciphers: a Synthetic Approach[C]. Proceed- ings, Advances in Cryptology-CRYPTO'93, 1993.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部