期刊文献+

基于纠错码的SM3改进算法

Improved SM3 Algorithm Based on Error-correcting Code
下载PDF
导出
摘要 目前,密码分析者已经可以在较短的时间内有效找到MD5、SHA1等国际密码杂凑算法的碰撞,通过熵增来增强杂凑值的随机性是提高密码杂凑算法抗碰撞性的有效途径,因此提出一种将纠错码和SM3算法迭代结构融合的改进方案。首先,基于纠错码的线性性质和最小汉明距离最大化原则,选择拟阵理论所构建的二进制线性分组码,计算出其系统形式的生成矩阵,并通过循环移位来消除比特之间的规律,计算最终产生的有效码字;其次,在线性分组码中遵循周期性原则选取最优码字来构建初始常量值,并将其赋值于初始寄存器中,同时在迭代结构中引入初始寄存器构成算法的压缩函数,完成杂凑算法迭代结构的二次构建;最后,考虑杂凑值信息熵对算法混乱度的评估能力,将提出的方案与现有公开的国际密码杂凑算法进行对比实验,同时进行雪崩效应、算法效率、内存损耗测试,并进行综合评价。实验结果表明,本文方案在不改变运算效率的前提下具有稳定的雪崩效应,运行过程中的内存损耗比SM3算法降低0.01~0.07 MB,同时杂凑值的信息熵值高于其他对比算法。提出的基于纠错码的改进方案能够通过熵增证明杂凑值比特之间的随机性更高,更好实现隐藏明文和杂凑值之间统计信息的目的,提高了密码杂凑算法的安全性。 Cryptanalysts now can effectively find the collisions of MD5,SHA1 and other international hash algorithms in a short time.Increasing entropy to enhance the randomness of hash value is an effective way to improve the anti-collision performance of hash algorithm.Therefore,an improved scheme combining the iterative structure of error-correcting code and SM3 algorithm was proposed.Firstly,based on the linear properties of error-correcting codes and the maximization principle of minimum Hamming distance,the binary linear block codes constructed by matroid theory were selected to calculate their systematic form of generation matrix,the rules between bits were eliminated by cyclic shift,and the effective code words were calculated.Secondly,in the linear block code,an optimal code word was selected to construct the initial constant value according to the periodicity principle,and its value was assigned to the initial register.At the same time,a compression function of the initial register formation algorithm was introduced into the iterative structure to complete the second construction of the iterative structure of the hash algorithm.Finally,considering the evaluation ability of hash value information entropy on chaos degree of the algorithm,the proposed scheme was compared with existing international hash algorithms,and avalanche effect,the algorithm efficiency and memory loss were tested and comprehensively evaluated.Experimental results showed that the proposed scheme has stable avalanche effects without changing the computational efficiency,the memory loss during operation is 0.01~0.07 MB lower than that of SM3 algorithm,and the information entropy of the hash value is higher than that of other comparison algorithms.The improved scheme based on error correction code can prove that the randomness between hash bits is higher through entropy increase,which can better achieve the purpose of hiding statistical information between plaintext and hash,value,and improve the security of hash algorithm.
作者 郑明辉 乔译萱 朱小强 陈珩 ZHENG Minghui;QIAO Yixuan;ZHU Xiaoqiang;CHEN Heng(College of Intelligent Systems Sci.and Eng.,Hubei Minzu Univ.,Enshi 445000,China;School of Cyber Sci.and Eng.,Sichuan Univ.,Chengdu 610065,China)
出处 《工程科学与技术》 EI CSCD 北大核心 2023年第3期235-242,共8页 Advanced Engineering Sciences
基金 国家自然科学基金项目(61772181)。
关键词 杂凑算法 信息熵 纠错码 雪崩效应 hash algorithm information entropy error-correcting code avalanche effect
  • 相关文献

参考文献12

二级参考文献48

  • 1仰枫帆,毕光国.一种求循环码对偶码的新方法[J].高校应用数学学报(A辑),1996,11(2):139-144. 被引量:1
  • 2张学俊,王海华.拟循环码的对偶码[J].苏州大学学报(自然科学版),2006,22(4):22-26. 被引量:1
  • 3彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:42
  • 4Nishimura T. A new extremal self-dual code of length 64[J]. IEEE Transactions on Information Theory, 2004, 50(9): 2173-2174.
  • 5Carlach J C, Otmani A. A systematic construction of self-dual codes [J]. IEEE Transactions on Information Theory, 2003, 49(11): 3005-3009.
  • 6Li R, Li X, Mao Y, et al. Formally self-dual linear binary codes from circulant graphs[J]. EprintArxiv, 2014,53(9):1402-1417.
  • 7Harada M, Munemasa A. Classification of self-dual codes of length 36[J]. Advances in Mathematics of Communications, 2012, 6(2):229-235.
  • 8Bouyuklieva S, Bouyukliev I. An Algorithm for Classification of Binary Self-Dual Codes [J]. IEEETransactions on Information Theory, 2012, 58(6):3933-3940.
  • 9Vantilborg H C A. On quasi-cyclic codes with rate 1/m [J]. IEEE Transactions on Information Theory, 1978, 24(5):628-629.
  • 10Phillippe G, Ayoub O. Table of binary self-dual codes [EB/OL]. http://www.unilim.fr/pages_perso/philippe. gaborit/SD/GF2/ GF 2I. htm, 2008-09-01.

共引文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部