期刊文献+

SHA-3的安全性分析 被引量:3

Security analysis of SHA-3
下载PDF
导出
摘要 为分析hash函数新标准SHA-3算法的安全性,从算法统计性能和轮函数Keccak-f的对称性两个方面对其进行测试。测试结果表明,SHA-3算法雪崩效应良好,平均变化比特数和平均变化概率都非常接近理想值且方差比较小,具有较高的稳定性和较低的碰撞程度;Keccak-f中添加常数的变换会严重扰乱轮函数的对称性,利用轮函数对称性对SHA-3进行内部差分攻击只适用于轮数较少的情况。 In order to evaluate the new hash standard SHA-3,this paper conducted a security analysis of it from the perspective of statistical performance and symmetrical property of round permutation Keccak-f. The results show that SHA-3 possesses favorable avalanche effect,and average number of changed bits and average probability of changed bits are both very close to the ideal value with a small standard deviation. It has high stability and low collision degree. The ι mapping which was used to add round constants could seriously disrupt the symmetry of Keccak-f. Thus,internal differential attack could only be achieved in a limited numbers of rounds.
作者 王淦 张文英
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期851-854,865,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61272434) 山东省自然科学基金资助项目(ZR2012FM004 ZR2013FQ021) 信息保障技术重点实验室开放课题(KJ-13-004)
关键词 HASH函数 SHA-3 安全性分析 统计性能 对称性 hash function SHA-3 security analysis statistical performance symmetrical property
  • 相关文献

参考文献2

二级参考文献26

  • 1[10]Boer, B. den, Bosselaers, A., Collisions for the compression function of MD5, Advances in Cryptology, Eurocrypt'93, 1994, LNCS 765: 293-304.
  • 2[11]Dobbertin, H., Cryptanalysis of MD5 compress, Advances in Cryptology, Eurocrypt'96, Rump Session, 1996.
  • 3[12]Boer, B. den, Bosselaers, A., An attack on the last two rounds of MD4, Advances in Cryptology, Crypto'91, 1992,LNCS 576: 194-203.
  • 4[13]Dobbertin, H., RIPEMD with two round compress function is not collision-free, J. Cryptology, 1997, 10(1): 51-70.
  • 5[14]Her, Y. S., Sakurai, K., Kim, S. H., Attack for finding collision in reduced versions of 3-pass and 4-pass HAVAL,in Proceedings of International Conference on Computers, Communications and Systems (2003ICCCS), CE-15:75-78.
  • 6[15]Kasselman, P. R., Penzhorn, W. T., Cryptananlysis of reduced version of HAVAL, Electronic Letters, 2000, 36(1):30-31.
  • 7[16]Park, S., Sung, S. H., Chee, S. et al., On the security of reduced versions of 3-pass HAVAL, Proceedings of ACISP,2002, 406-419.
  • 8[17]Chabaud, F., Joux, A., Differential collisions in SHA-0, Advances in Cryptology, Crypto'98, 1998, LNCS 1462:56-71.
  • 9[18]Joux, A., Collisions for SHA-0, Rump Session of Crypto'04.
  • 10[19]Biham, E., Chen, R., Near collision for SHA-0, Advances in Cryptology, Crypto'04, 2004, LNCS 3152: 290-305.

共引文献15

同被引文献17

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部