期刊文献+

一种新的抗模差攻击SHA-1体制

A New SHA-1 System to Resist Modular Differential Attack
下载PDF
导出
摘要 消息修改技术和模减差分攻击方法对SHA-1构成严重安全性威胁。基于SHA-1存在无法抵抗模减差分攻击的安全性缺陷,提出一种对SHA-1的改进算法。该算法有效地增加了运用消息修改技术的困难,并且得到良好的差分扩散特性。由于改进Hash算法只改动了步函数,仅增加了一个加法和循环移位,没有改变信息填充方式和消息摘要长度,容易实现原有基于SHA-1的软硬件产品的升级。经证明并通过算法实现,得出改进SHA-1与标准SHA-1的效率相当。 News modify technique and method of modular differential attack pose a serious security threat to SHA-1. Based on the fact that SHA - 1 security defects cannot resist modular differential attack, an im- provement algorithm of SHA-1 is proposed. This algorithm can effectively increase difficulties using news modify, and get good differential diffusion characteristic. Due to improved SHA-1 merely changed step function, only added a addition and cycle shift, did not change the filled information and digest length, therefore easy to implement to update original hardware and software based on SHA-1. Efficiency is alike between improved SHA-1 and standard SHA-1 through proving and realizing.
出处 《北京电子科技学院学报》 2012年第2期43-49,共7页 Journal of Beijing Electronic Science And Technology Institute
关键词 SHA-1 消息修改 模减差分 局部碰撞 SHA-1 news modify modular differential local collision
  • 相关文献

参考文献7

  • 1Wang X Y, Yu H B. How to breakMD5 and other hash functions[ C]. Cramer (ed). EUROCRYPT 2005, LNCS 3494. Berlin : Springer - Verlag, 2005 : 19 - 35. 被引量:1
  • 2Wang X Y, Yiqun Lisa Yin, Yu H B. Finding collisions in the full SHA - 1 [ C ]. Shoup (ed). CRYPTO 2005, LNCS 3621. Berlin: Springer- Verlag, 2005:17 -36. 被引量:1
  • 3National Institute of Standards and Technology. FIPS 180 -2 :Secure Hash Standard (August 2002), http ://csrc. nist. gov. 2011. 被引量:1
  • 4James Docherty, Albert Koelmans. A Flexible Hardware Implementation of SHA - 1 and SHA -2 Hash Functions [C]. ISCAS2011, IEEE2011. pp. 1932 - 1935. 被引量:1
  • 5金锋,王金文,郭菲菲.SHA-1算法在TM卡预付费智能水表设计中的实现[J].北京理工大学学报,2009,29(1):32-34. 被引量:1
  • 6刘建东,余有明,江慧娜.单向Hash函数SHA-1的统计分析与算法改进[J].计算机科学,2009,36(10):141-145. 被引量:7
  • 7武金梅..对缩短步数的HASH函数算法SHA-256、SHA-512的分析[D].山东大学,2008:

二级参考文献16

  • 1李庆瑞,袁魏华,葛建峰.基于PIC16F84单片机的IC卡智能水表设计[J].微计算机信息,2006(06Z):4-5. 被引量:7
  • 2盛利元,李更强,李志炜.基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J].物理学报,2006,55(11):5700-5706. 被引量:19
  • 3US Department of Commerce. Technology administration. FIPS PUBS 180-2, secure hash standard[S]. US: Federal Information Processive Standards Publication, 2002. 被引量:1
  • 4Dallas Semiconductor Corporation. White Paper 3: why are 1 wire SHA-1 devices secure? [EB/OL]. [2002-07- 07] . http: // www. maxim-ic, com. cn/appnotes. cfm/an pk/1098/AN1098, pdf. 被引量:1
  • 5DaLlas Semiconductor Corporation. The book of DS1961s iButton standard[EB/OL]. [2004-03-12]. http://www, maxim-ic, com. cn/quick_view2, cfm? qv_ pk=3557. 被引量:1
  • 6TI Corp. Patesheet of MSP430x13x, MSP430x14x, MSP430x14xl mixed signal microcontroller (Rew. F) [DB/OL]. (2000 -07)[2004-06-03]. http: //focus. ti. com/docs/prod/folders/print/msp430f149, htmt. 被引量:1
  • 7NIST. Secure hash standard[S]. Federal Information Processing Standards, FIPS-180-1 ,April 1995. 被引量:1
  • 8Wang X Y, Yin Y L, Yu H B. Finding collisions on the Full SHA-1[C]//Advances in Cryptology-Crypto'05, LNCS 3621. 2005 ; 17-36. 被引量:1
  • 9Wang X, Yao A, Yao F. New Collision Search for SHA-1 [C]// Presentation at rump session of Crypto 2005. 被引量:1
  • 10National Institute of Standards and Technology. Announcing the Development of New Hash Algorithms for the Revision of FIPS 180-2[S]. Secure Hash Standard. Federal Register, January 2007. 被引量:1

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部