Hash差分攻击算法研究  被引量:1

Research of Differential Attack Algorithms to Hash

在线阅读下载全文

作  者:周林[1] 韩文报[1] 王政[1] 

机构地区:[1]解放军信息工程大学信息研究系,郑州450002

出  处:《计算机科学》2010年第9期97-100,共4页Computer Science

基  金:863国家重点基金项目(2009AA012417);国家自然科学基金(2007B74)资助

摘  要:Hash函数广泛应用于商业、军事等领域,因此对Hash算法的攻击在理论上和实际应用上都有重要的意义。自王小云教授提出差分攻击算法并攻破SHA-1,MD5,RIPEMD,MD4以来,对该算法的研究日益受到关注。然而王教授没有给出如何寻找差分和差分路径的方法。国内外专家都猜测她是靠非凡的直觉手工完成的,如何寻找差分和差分路径的方法成为关注的热点。构造差分路径涉及到如何处理差分循环移位和选择高概率的充分条件。业已证明,一般情况下,差分位移后有4种情况,并给出了4种情况的概率,最后比较了4种情况的概率。Hash functions are widely used in business,military field etc.Therefore,the attack to Hash functions has important meaning in theory and in practical application.Since professor Wang proposed differential attack algorithm and succeeded to break SHA-1,MD5,RIPEMD,MD4,this algorithm has been paid more and more attention.However,Pro Wang do not supply the method to get difference and differential path.Experts at home and abroad guessed that she made it by hand with her outstanding intuition.Therefore,finding the method to get difference and differential path becomes hotspot.We must tackle the circle shift difference and select the high probability sufficient conditions when constructing the differential path.This paper verified there are four conditions and gave their probability and compared them with each other.

关 键 词:MD5 HASH函数 差分攻击 隧道技术 多消息修正方法 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象