摘要
为了分析Hash函数的安全性,利用模差分,给出了一种新的Haval-128的碰撞攻击方法。主要结论是对于不同的初值可以选择不同的模差分,因而初值的选取具有更大的灵活性,并且给出了一种更有效的高级明文修改方法。在这组新的初值和差分条件下,通过PC机上大量测试,表明算法稳定以1/140左右的概率找到一组碰撞。该攻击方法同样适用于其它Hash函数,比如MD5和SHA1。
In order to analyze the security of Hash functions, a new attack on Haval-128 is concerned with modular differential. The major results include that different modular differential can be found aimed at different initial values, which leads to a more flexible choice of initial values, and a new method of message modification is given. Experimental results on PC demonstrate collision will be found with probability 1/140 under this attack. This method is also applicable to other hash functions, such as MD5 and SHA1.
出处
《计算机工程与设计》
CSCD
北大核心
2008年第20期5159-5162,共4页
Computer Engineering and Design
关键词
杂凑函数
碰撞
差分分析
差分特征
高级明文修改
Hash function
collision
differential analyzing
differential characters
advanced message modification