期刊文献+

一种基于移位取反和加法的字符串哈希算法

A string hash algorithm based on shift inversion and addition
下载PDF
导出
摘要 哈希算法大量应用于信息传输、存储、校验等领域,其中面向字符串的哈希算法结构简单、易编码实现、速度快,这类算法的设计往往使用位操作、算术运算、查表等运算的组合来实现,不同的组合在性能和效果上也不相同。理论上,运算步骤越简单、性能越好,但哈希效果难以保证;步骤越多、性能越差,但哈希效果容易有保障。本文使用移位、取反和加法三种基本运算,设计了一种快速字符串哈希算法,使用较少的步骤获得了较好的性能和效果。通过与BKDR哈希算法对比测试,本算法在性能上有8%的优势,两者哈希效果相当。 Hash algorithm is widely used in information transmission,storage,verification,etc.The hash algorithm for string is simple in structure,easy to encode,and fast.The design of such algorithms is often implemented by a combination of operations such as bit operations,arithmetic operations,and table lookups.Different combinations are different in performance and effect.In theory,the simpler the operation steps,the better the performance,but the hash effect is difficult to guarantee;the more steps,the worse the performance,but the hash effect is easily guaranteed.In this paper,basic operations of shift,inversion and addition are used to design a fast string hashing algorithm,which achieves better performance and effect with fewer steps.By comparing with the BKDR hash algorithm,the algorithm has an 8%advantage in performance,and the hash effect is equivalent.
作者 李立亚 吴丽 迟荣华 Li Liya;Wu Li;Chi Ronghua(School of Artificial Intelligence,Wuxi Professional College of Science and Technology,Wuxi,Jiangsu 214028,China)
出处 《计算机时代》 2022年第11期65-68,共4页 Computer Era
基金 未来网络科研基金项目(FNSRFP-2021-YB-56) 江苏省高等学校教育技术研究会高校教育信息化研究课题(2021JSETKT034)。
关键词 哈希算法 移位 取反 加法 哈希效果 哈希性能 hash algorithm shift inversion addition hash effect hash performance
  • 相关文献

参考文献7

二级参考文献74

  • 1王宁,邱绪东,罗嫔.基于hash函数和公钥算法的一次性口令方案[J].计算机应用研究,2009,26(2):716-718. 被引量:11
  • 2王念平.关于“2^k元域上的二次方程根的公式”的注记[J].数学的实践与认识,2004,34(11):148-152. 被引量:6
  • 3程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 4梁杰,来学嘉.Improved Collision Attack on Hash Function MD5[J].Journal of Computer Science & Technology,2007,22(1):79-87. 被引量:12
  • 5[3]Carter J L,Wegman M N.Universal classes of hash functions.Journal of Computer and System Sciences,1979,18:143~154
  • 6DENG Shao-jiang,XIAO Di,LI Yan-tao,et al.A novel combined cryptographic and hash algorithm based on chaotic control character[J].Communications in Nonlinear Science and Numerical Si-mulation,2009,14(11):3889-3900.
  • 7DENG Shao-jiang,LI Yan-tao,XIAO Di.Analysis and improvement of a chaos-based hash function construction[J].Communications in Nonlinear Science and Numerical Simulation,2010,15(5):1338-1347.
  • 8RIVEST R L.RFC 1321,the MD5 message digest algorithm request for comments[S].Cambridge:MIT and RSA Data Security,1992.
  • 9NIST F P.FIPS Pub 180,secure hash standard[S].Washington DC:U.S.Department of Commerce,1993.
  • 10WANG Xiao-yun,FENG Deng-guo,LAI Xue-jia,et al.Collisions for hash functions MD4,MD5,HAVAL-128 and RIPEMD,2004/199[R/OL].(2004-08-17).http://eprint.iacr.org/2004/199.pdf.

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部