期刊文献+

具有可变散列输出的安全Hash算法 被引量:2

A One-Way Hashing Algorithm with Variable Length of Output
下载PDF
导出
摘要 本文给出了一个具有可变散列输出的安全Hash算法,该算法可以把任意长的消息散列成128,160,192,224或256比特的消息摘要。算法的安全性与有效性都能满足实际的需求;设计简单,没有大的数据结构和复杂程序;运行速度快,适用于高速软硬件实现,特别适用于32-位的计算机处理;安全性方面比SHA算法更具优势,算法不仅能抗所有已知攻击,而且还提供了充分大的安全空间来抗将来的未知攻击。文章给出了算法的具体描述,设计诱因和安全性分析,并且将算法与其它同类算法进行比较。 A One-way hashing algorithm with variable length of output is presented in the paper. The algorithm compresses a message of arbitrary length into a digest of 128,160,192,224,256 bits. The advantages of the algorithm are simple in design,fast in speed,very efficient and particularly suited for 32-bit computer which predominates the current workstation market. The algorithm is prior to SHA in secure.it can thwart not only the known attacks,but also future unknown attacks. The specifications, design rationale and security analysis are given in the paper. In addition,the compared results to other algorithms are listed at the end of the paper.
出处 《计算机科学》 CSCD 北大核心 2004年第4期189-191,197,共4页 Computer Science
基金 国家"十五"国防预研基金(41001040102) 国家重点基础研究发展规划973资助项目(G1999035804)
关键词 安全Hash算法 消息散列 单向散列算法 公钥密码体制 密码学 Digest, Hash algorithm, SHA, Birthday attack
  • 相关文献

参考文献9

  • 1Damgard I. A design principle for hash functions. In: G.Brassard,ed. Advances in Cryptology-Proceedings of Crypto'89,Lecture Notes in Computer Science, Springer-Verlag, 1990, 435:416-427
  • 2Schneier B. Applied Cryptography: protocols, algorithms, and source code in C,2nd Rev edition. John Wiley, 1996
  • 3Zheng Y, Pieprzyk J, Seberry J. HAVAL-A one-way hashing algorithm with variable length of output. Advances in CryptologyAUSCRYPT'92 Proceedings,Springer-Verlag,1993. 83-104
  • 4Anderaon R,Biham E, Knudaen I. Serpent: A proposal for the advanced encryption standard. NIST AES Proposal,1998
  • 5Matsui M. New block encryption algorithm MISTY. Fast Software Encryption ,FSE'97 ,LNCS 1267 ,Springer-Verlag, 1997.54-68
  • 6Preneel B. Analysis and design of cryptographic hash functions.PhD thesis,Katholieke University Leuven,Jan. 1993
  • 7Pieprzyk J, Sadeghiyan B. Design of hashing algorithms.Springer-Verlag, 1993
  • 8Berson T. Differential cryptanalysis Modwith applications to MD5. Advances in Cryptology-EUROCRYPT'92 Proceedings,1992. 71-80
  • 9den Boer B,Bosselaers A. Collisions for the compression function of MD5. Advances in Cryptology-EUROCRYPT'93 Proceedings,Springer-Verlag, 1994. 293-304

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部