期刊文献+

SHA-256算法的安全性分析 被引量:8

Analysis safety of SHA-256 algorithm
下载PDF
导出
摘要 现有算法MD5、SHA-1等的相继破译,严重威胁到SHA-256、SAH-384等算法的安全性。本文介绍了SHA-256的算法逻辑及压缩函数的构造,探讨了生日攻击碰撞阈值和攻击步骤,分析了SHA-256在生日攻击下的安全性。通过对Chabaud-Joux攻击SHA-256的分析,找到了一个部分碰撞,其复杂度为,却无法找到SHA-256的一个整体碰撞。所以,在抵抗生日攻击和抵御现有差分攻击方面,SHA-256比MD5和SHA-1等具有更高的安全性。 Existing algorithms MD5,SHA-1 etc.have been deciphered,itis a serious threat to the SHA-256,SAH-384 algorithms such as security.This article describes the SHA-256 algorithm logic and structure of the compression function,explores the collision threshold birthday attack and attack procedures,and analyzesthe security of SHA-256 in birthday attack security.After analysis Chabaud-Joux attack by the SHA-256 analysis,that it find a part of the collision,its complexity is,but it could not find a whole SHA-256 collisions.So,in the resistance birthday attack and defend against the existing differential attacks,so SHA-256 has higher security than MD5 、SHA-1 and so on.
作者 何润民 马俊
出处 《电子设计工程》 2014年第3期31-33,共3页 Electronic Design Engineering
关键词 HASH函数 SAH-256 生日攻击 差分攻击 Hash function SAH-256 birthday attack differential attack
  • 相关文献

参考文献7

  • 1FIPS 180-1.Secure hash standard[S].NIST,US Department of Commerce.Washington D C:Springer-Verlag,1996.
  • 2Hsu W H,Tung M C,W u L Y.An integrated end to-end QoS anycast routing on DiffServ net works[J].Computer Commun cations.2007, 30(6): 1406-1418.
  • 3葛辉.一种256位hash函数算法[J].大众科技,2005,7(5):107-108. 被引量:5
  • 4黄月江,祝世雄.信息安全与保密[M].北京:国防工业出版社,2008:141-170.
  • 5GLBERT H, HANDSCHUH H.Security analys is of SHA-256 and sisters [C] // Selected Areas in Cryptagraphy'03, Lecture Notes inComputer Science,2003,(3006): 175-193.
  • 6Chabaud F,Joux A,Differential collisions in SHA -0[C] // Advances in Crypyology-CRYPYO'98,Lecture Notes in corn puter Science, 1998,(1462):56-71.
  • 7YOSH DA H,BRYUKOV A. Analysis of a SHA-256 variant [C]// Selected Areas in Cryptography (SAC20OS),Kingston On tario,2005: 245-260.

二级参考文献2

  • 1(美)[B.施奈尔]BruceSchneier著,吴世忠等.应用密码学[M]机械工业出版社,2000.
  • 2樊〓丰,林东.网络信息安全与PGP加密[M]清华大学出版社,1998.

共引文献11

同被引文献64

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部