| 注册
首页|期刊导航|计算机应用与软件|基于混沌的Hash函数的安全性分析

基于混沌的Hash函数的安全性分析

谭雪 周琥 王世红

计算机应用与软件2016,Vol.33Issue(6):320-324,5.
计算机应用与软件2016,Vol.33Issue(6):320-324,5.DOI:10.3969/j.issn.1000-386x.2016.06.076

基于混沌的Hash函数的安全性分析

CRYPTANALYSIS OF HASH FUNCTIONS BASED ON CHAOTIC SYSTEM

谭雪 1周琥 1王世红1

作者信息

  • 1. 北京邮电大学理学院 北京 100876
  • 折叠

摘要

Abstract

With the development of modern cryptology,hash functions play an increasingly important role.In this paper,we analyse the security of two hash algorithms,one is a parallel hash function construction based on coupled map lattice,the other is the keyed serial hash function based on a dynamic lookup table.For the former,we find that the coupled map lattice leads to a structural defect in the algorithm. Under the condition of block index and block message meeting specific constraint,without the complicated computation it is able to directly give the intermediate hash value of the specific block index and block message.For the latter,we analyse the constraint condition of the state of a buffer that the collision is produced.Under this condition,the cost of output collisions of the algorithm found is O (2 100 ),much higher than that of the birthday attack.

关键词

Hash函数/混沌/碰撞/安全性分析

Key words

Hash function/Chaotic/Collision/Security analysis

分类

信息技术与安全科学

引用本文复制引用

谭雪,周琥,王世红..基于混沌的Hash函数的安全性分析[J].计算机应用与软件,2016,33(6):320-324,5.

计算机应用与软件

OACSTPCD

1000-386X

访问量0
|
下载量0
段落导航相关论文