一種混沌Hash算法的改進及其性能分析
發(fā)布時間:2018-04-25 08:50
本文選題:密碼學 + 混沌; 參考:《重慶大學》2014年碩士論文
【摘要】:在數(shù)據(jù)的完整性,消息認證和數(shù)字簽名等方面Hash函數(shù)起到了越來越重要的作用。MD5算法已經(jīng)被宣告破解,很多經(jīng)典的單向Hash函數(shù)也逐漸暴露出缺陷,怎樣能構造出更安全有效的Hash算法成為近年來的研究熱點。 2003年,K.W. Wong首次將加密和Hash函數(shù)通過混沌聯(lián)系在一起。這引起了Hash函數(shù)研究者的廣泛關注。近年來,基于混沌的Hash函數(shù)的構造成為了密碼學中的研究熱點。本論文的主要研究工作如下: (1)論述了混沌的理論基礎。。混沌加密作為密碼學的新方向,在過去的十年里得到了廣泛的發(fā)展;煦缑艽a學已成為現(xiàn)代密碼學的一種重要分支,在保護數(shù)據(jù)安全方面有著巨大的潛力。 (2)著眼于多個方面,詳細論述了Hash函數(shù)的理論基礎。介紹了Hash函數(shù)的定義和性質、以及Hash函數(shù)在信息保護和認證方面的廣泛應用。然后,,介紹了Hash函數(shù)的帶密鑰和不帶密鑰的兩種分類。介紹了混沌的一些特性,如靈敏度和對初始條件的參數(shù)的敏感,遍歷性,論述了混沌Hash函數(shù)在信息認證和信息安全方面有著獨特的優(yōu)勢。最后,闡述了Hash函數(shù)的常用的構造方法以及對其性能進行評測的常用方法。 (3)對一種基于可變參數(shù)的混沌帳篷映射的新的文本Hash函數(shù)算法進行分析,發(fā)現(xiàn)該算法無法抵抗偽造攻擊和弱密碼性。本文采用明文擴展和Hash值聚合的方法提高該算法的抗偽造攻擊性和抗碰撞性。通過理論分析和實驗數(shù)據(jù)證明改進的算法具有很好的單向性、混亂與擴散性和抗碰撞性。將本算法與經(jīng)典算法MD5、康小培等發(fā)表的基于雙混沌映射的文本散列函數(shù)算法以及基于混沌查找表的散列函數(shù)進行比較,經(jīng)過分析得到,本算法在抗碰撞性和敏感性方面都體現(xiàn)出了良好的性能。 最后,總結了本文的內容,并指出其不足之處,而后展望了Hash函數(shù)的研究前景。
[Abstract]:In the aspects of data integrity, message authentication and digital signature, the Hash function has played a more and more important role. MD5 algorithm has been declared to be cracked, and many classic one-way Hash functions have gradually exposed their defects. How to construct a more secure and effective Hash algorithm has become a hot topic in recent years. In 2003, K. W. Wong first associated encryption with Hash function through chaos. This has attracted the attention of Hash function researchers. In recent years, the construction of Hash functions based on chaos has become a hotspot in cryptography. The main research work of this thesis is as follows: 1) the theoretical basis of chaos is discussed. As a new direction of cryptography, chaotic encryption has been widely developed in the past ten years. Chaotic cryptography has become an important branch of modern cryptography and has great potential in protecting data security. The theoretical basis of Hash function is discussed in detail. This paper introduces the definition and property of Hash function, and the wide application of Hash function in information protection and authentication. Then, two kinds of classification of Hash function with and without key are introduced. Some characteristics of chaos, such as sensitivity, sensitivity to initial conditions, ergodicity and ergodicity, are introduced. The unique advantages of chaotic Hash function in information authentication and information security are discussed. Finally, the common methods of constructing Hash function and evaluating its performance are described. A new text Hash function algorithm based on variable parameter chaotic tent mapping is analyzed. It is found that the algorithm can not resist forgery attacks and weak cryptography. In this paper, plaintext extension and Hash aggregation are used to improve the anti-forgery and anti-collision of the algorithm. Theoretical analysis and experimental data show that the improved algorithm has good unidirectionality, chaos and diffusion, and anti-collision. This algorithm is compared with the classical algorithms MD5, Compai and so on, which are based on the double chaotic mapping and the hash function based on chaotic lookup table. The algorithm has good performance in collision resistance and sensitivity. Finally, this paper summarizes the content of this paper, points out its shortcomings, and then looks forward to the research prospect of Hash function.
【學位授予單位】:重慶大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.1
【參考文獻】
相關期刊論文 前7條
1 鄧紹江;李艷濤;張岱固;肖迪;;基于混沌查找表的單向Hash函數(shù)構造算法[J];計算機工程;2010年10期
2 康小培;李艷濤;鄧紹江;馮艷茹;;基于雙混沌映射的文本hash函數(shù)構造[J];計算機應用研究;2010年07期
3 曹珍富;薛慶水;;密碼學的發(fā)展方向與最新進展[J];計算機教育;2005年01期
4 馮登國;國內外密碼學研究現(xiàn)狀及發(fā)展趨勢[J];通信學報;2002年05期
5 盛利元;李更強;李志煒;;基于切延遲橢圓反射腔映射系統(tǒng)的單向Hash函數(shù)構造[J];物理學報;2006年11期
6 劉建東;余有明;;基于可變參數(shù)雙向耦合映像系統(tǒng)的時空混沌Hash函數(shù)設計[J];物理學報;2007年03期
7 何婷婷;羅曉曙;廖志賢;韋正叢;;一種新的混沌映射散列函數(shù)構造方法及應用[J];物理學報;2012年11期
本文編號:1800628
本文鏈接:http://sikaile.net/kejilunwen/wltx/1800628.html
最近更新
教材專著