哈希函數(shù)的迭代結(jié)構(gòu)與壓縮函數(shù)研究
[Abstract]:Hash function plays an important role in cryptography security and network applications. It has been widely used in many fields such as digital signature, cryptographic preservation and so on. However, since the cryptographer has been able to find the collision of MD5,SHA0,SHA1 and so on effectively in a short time, it shows that the traditional hash function has suffered a serious security problem. Therefore, in recent years, for various security and efficiency problems of hash functions, researchers have mainly proposed two different function design schemes, one is for the improvement of iterative structure, the other is for the improvement of compression function. The former focuses on improving the efficiency of the function, while the latter aims to improve the security of the function. The high efficiency of parallel structure has attracted more and more researchers' attention. Chaotic mapping is highly sensitive to system parameters and has become a new way to design hash functions. In this paper, we introduce parallel structure, chaotic mapping, transformation based on lattice and other design methods, aiming at the features that hash function is not efficient and can be proved to resist collision. The iterative structure and the compression function of the hash function are improved respectively. The main work of this paper is as follows: 1) aiming at the low efficiency of SHA256, an improved SHA256 algorithm based on parallel architecture is designed in this paper. The original algorithm of message calculation is a serial calculation method, it is necessary to take the value calculated from the previous message packet as the input value of the next message block. Therefore, to calculate the value of the latter message packet, only the value of the previous message packet is calculated. When the message involved in the operation is large enough, the computation efficiency is very low. For this problem, we design a parallel hash algorithm. When the messages are grouped, the values of each message block are calculated first, and then each two message blocks are combined in the next round of calculations. When the number of message blocks in this round is odd, the value of a message block is added, so the number of message blocks will be reduced by nearly half after a round operation. A similar operation is performed until the final value of a message block is used as the final hash value. In the operations of odd and even rounds, message block grouping is calculated in different combinations. Finally, through theoretical analysis and experimental simulation, the proposed scheme is analyzed, which shows that the proposed scheme is feasible and advanced. 2) SHA1 is obviously superior to SHA256, in operation efficiency, but it is faced with important security problems. A partial collision of SHA1 has been found. In this paper, the compression function of SHA1 is improved. Chaotic mapping is introduced in the process of designing the compression function. The chaotic mapping is combined with the compression function by switching between multiple chaotic maps. In order to enhance the avalanche of the function, the interlinked variable value is controlled by multiple mixed iterations. The idea of lattice is introduced when the last message block is processed, and a hashing function based on lattice is designed to prove collision resistance. The value after lattice transformation is taken as the final output hash value. In the security proof, the collision resistance of the hash function is reduced to the problem on the lattice and the difficulty of the problem is proved. Finally, the theoretical analysis and experimental simulation of the proposed scheme are carried out.
【學(xué)位授予單位】:深圳大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN918.1
【參考文獻(xiàn)】
相關(guān)期刊論文 前7條
1 ZHEN Ping;ZHAO Geng;MIN Lequan;LI Xiaodong;;Novel Hash Function Based on Coupled Chaotic Map Lattices[J];Chinese Journal of Electronics;2014年04期
2 王尚平;任姣霞;張亞玲;韓照國(guó);;改進(jìn)M-D結(jié)構(gòu)的二次多變量Hash算法[J];哈爾濱工程大學(xué)學(xué)報(bào);2011年04期
3 郭偉;王小敏;劉景;何大可;;基于混沌消息擴(kuò)展的單向Hash函數(shù)[J];西南交通大學(xué)學(xué)報(bào);2010年05期
4 劉建東;余有明;江慧娜;;單向Hash函數(shù)SHA-1的統(tǒng)計(jì)分析與算法改進(jìn)[J];計(jì)算機(jī)科學(xué);2009年10期
5 趙耿;袁陽;王冰;;基于交叉耦合映象格子的單向Hash函數(shù)構(gòu)造[J];東南大學(xué)學(xué)報(bào)(自然科學(xué)版);2009年04期
6 肖皇培;張國(guó)基;;基于Hash函數(shù)的報(bào)文鑒別方法[J];計(jì)算機(jī)工程;2007年06期
7 張瀚,王秀峰,李朝暉,劉大海;基于時(shí)空混沌系統(tǒng)的單向Hash函數(shù)構(gòu)造[J];物理學(xué)報(bào);2005年09期
,本文編號(hào):2389512
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2389512.html