期刊文献+

基于丢番图内核的新型哈希函数

A Hash Function with Diophantine Equation Kernel
下载PDF
导出
摘要 传统的哈希函数,如消息摘要算法第5版(MD5)、安全散列算法(SHA-1)等,其抗原象攻击能力依赖于大量杂凑运算的无规律性,安全性无法从理论上得到证明,一些常用的哈希函数已经发现碰撞.提出了一种带有丢番图内核的新型哈希函数(diophantine equation kernel based Hash algorithm,DEKHA).DEKHA以传统哈希架构为主体,在保证计算效率的基础上,添加了一个内核,该内核是由一种数学难题——丢番图问题构建,可保障其安全性.讨论了DEKHA的安全性、性能和效率,并通过仿真实验进行分析比较,结果表明该DEKHA可以满足哈希函数的所有效率和性能需求,与其他哈希函数具有可比性.由于DEKHA很好的单向性及实用性,可以很方便地在密码学应用中使用. Hash function is the core of information security, especially for the cryptography. Always the traditional Hash functions are based on logical operations, but the security of them can not be proved theoretically. Actually, recent investigations on the collision frequencies have revealed that,in some well-known methods,such as MD5 ,SHA 1 ,there exist flaws that were not discovered before. To overcome the said drawbacks,a new Hash function with diophantlne equation kernel based Hash algorithm(DEKHA) is pro- posed. Different from the traditional Hash functions, DEKHA has a kernel of diophantine equation constructed from the product of polynomial integers. In that way,the security of DEKHA relies on the well-known diophantine equation problem which is computa tionally hard. ()ur theoretical analysis and computer simulations indicate that the proposed Hash algorithm can satisfy all the perform ance requirements of Hash function in an efficient and flexible manner. DEKHA seems to be a good candidate as a secure Hash func tion for use in cryptographic applications.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第1期19-24,共6页 Journal of Xiamen University:Natural Science
基金 福建省自然科学基金项目(2010J01348)
关键词 哈希函数 丢番图内核 丢番图方程 密码学 Hash function diophantine equation kenel diophantine equation cryptography
  • 相关文献

参考文献21

  • 1Knuth D E. The art of computer programming, sorting and searching,vol. 3[M]. 2nd ed. Boston, Massachusetts: Addison-Wesley Professional, 1998.
  • 2Stinson D. Cryptography: theory and practice[M]. 3rd ed. Boca Raton, FL : Chapman: Hall/CRC, 2006.
  • 3Merkle R C. One way hash functions and DES[C]//Ad- vances in Cryptology-CRYPTO' 89,9th Annual Interna- tional Cryptology Conference. London, UK: Springer Press, 1989 : 428-446.
  • 4Damgfird I. A design principle for hash functions[C]// Advances in Cryptology-CRYPTO' 89,9th Annual Inter-national Cryptology Conference. London, UK: Springer Press, 1989 .. 416-417.
  • 5Wang Xiaoyun, Feng Dengguo, Lai Xuejia, et al. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL]. [2004-08 16]. http://web, mit. edu/ lust flum/documents/erypto, pdf.
  • 6Wang Xiaoyun, Yin I.isa Yiqun, Yu Hongbo. Finding col lisions in the Full SHA 1[J]. Lecture Notes in Computer Science,2005,3621 : 17 36.
  • 7Billet O, Robshaw M J B, Pevrin T. On building Hash functions from multivariate quadratic equations[C] // ACISP'07 Proceedings of the 12th Australasian confer- ence on Information. Berlin, Heidelberg: Springer Press, 2007:82-95.
  • 8Ding Jintai, Yang Boyin. Multivariates polynomials for hashing[C]//3rd SKLOIS Conference on Information Se curity and Cryptology (lnscrypt 2007). Berlin, Heidel- berg : Springer Press, 2007 : 358-371.
  • 9Aumasson J P, Meier W. Analysis of multivariate Hash function[C]//ICISC'07 Proceedings of the 10th Interna tional Conference on Information Security and Cryptolo- gy. Berlin, Heidelberg : Springer Verlag, 2007 : 309-323.
  • 10Wang Shangping, Zhang Yaling, Zou Youjiao, et al. A new hash algorithm based on MQ problem and polymor- phie cipher[C] // International Conference on Informa- tion Science and Technology (ICIST 2011). United States: IEEE Computer Society, 2011 : 193-198.

二级参考文献21

  • 1孟庆树,张焕国,王张宜,覃中平,彭文灵.Bent函数的演化设计[J].电子学报,2004,32(11):1901-1903. 被引量:16
  • 2唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745. 被引量:9
  • 3J Ding. Multivariate Public Key Cryptosystems[ M ]. Springer- Verlag,2006. 11 - 190.
  • 4J Ding,B Y Yang.Multivariates polynomials for hashing[ A]. Information Security and Cryptology ( Inscrypt ), Lecture Notes in Computer Seience[C], Vol.4990,2007. 358 - 371.
  • 5P A Fouque, L Granboulan, J Stem. Differential cryptanalysis for multivariate schemes E A ]. In Eurocrypt, LNCS 3494 [ C ]. Springer-Verlag, 2005. 341 - 353.
  • 6R C Merkel. A fast software one-way Hash ftmction[ J] .Journal of Cryptology, 1990,3 : 43 - 58.
  • 7Damgard I B.A design principle for Hash functions[ A] .Advances in Cryptology-Crypto[C]. Spring-Veflag, 1990. 416 - 427.
  • 8J C Faugere. A new efficient algorithm for computing Grobner bases without reduction to zero ( F5 ) [ A ]. ISSAC-2002 [ C ]. ACM Press, 2002.75 - 83.
  • 9Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov. Efficient algorithms for solving overdefined systems of multivariate polynomial equation [ A ]. Eurocrypt 2000, LNCS 1807 [ C ]. Springer, 2000. 392 - 407.
  • 10Raddum, Semaev. New technique for solving sparse equation systems[A]. Cryptology ePrint Archive [C]. Report 2006/ 475.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部