Hash function method with single round collision-proof performance

A hash value and equation technology, applied in the field of information security, can solve problems such as analytical operation collision

Inactive Publication Date: 2009-04-22
BEIJING NORMAL UNIVERSITY
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first reason is that the former is beneficial to hardware implementation, and the second is...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash function method with single round collision-proof performance
  • Hash function method with single round collision-proof performance
  • Hash function method with single round collision-proof performance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] B1) The present invention designs five kinds of hash values ​​128, 192, 256, 384 and 512 bits, and selects the number of coupling grid points according to the requirements of the hash value. The specific implementation parameters are as follows:

[0072] B1.1) The number of coupling grid points is N=4, the iteration round p=2, and a 128-bit hash value is output.

[0073] B1.2) The number of coupling grid points is N=6, the iteration round p=2, and a 192-bit hash value is output.

[0074] B1.3) The number of coupling grid points is N=8, the iteration round p=2, and a 256-bit hash value is output.

[0075] B1.4) The number of coupling grid points is N=12, the iteration round p=2, and a 384-bit hash value is output.

[0076] B1.5) The number of coupling grid points is N=16, the iteration round p=2, and a 512-bit hash value is output.

[0077] B2) The present invention needs to have definite initial state value H when realizing 1 , H 2 ,...,H N . Hash value output fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hash function method with single round of anti-collision performance, belonging to the information security technology field. The method comprises the following steps: taking a coupling mapping lattice as a model, a method which combines floating-point operation and the traditional bit operation is adopted. The coupling mapping adopts a way which combines the local area and overall coupling; the state variables in the mapping is determined by the chain variables; and the parameters in the mapping are determined by the input information and the expansion information thereof. Expansion is carried out to the input information by a non-linear ff (comprising cyclic shift, a module addition method and S-box operation) operation. Two overall coupling variables are introduced, and the overall coupling variables are a function of all the input information and the state variables. A module is taken towards the output variables and carries out exclusive calculation with an input chain variable and information; then the obtained result is changed into a real number as the continued iteration of the input value of the mapping. The invention uses the single round of high complexity and less rounds of calculation cost for guaranteeing the security thereof. The method has precise structure and changeable length of output hash value, is easy for software realization, and can also be realized by embedded type CPU technology hardware.

Description

technical field [0001] The invention relates to the technical field of information security, more specifically, a hash function method is designed. Background technique [0002] A hash function, also called a one-way hash function, is a function that compresses a message of any length into a message digest (also called a hash value) with a fixed length. There are many functions that meet this condition, but the hash function also requires to meet the following characteristics: (1) For a given message, it is easy to calculate its hash value; (2) Given a hash value, calculate the original Messages are computationally impossible; (3) Given a message and a hash value, it is impossible to find another different message such that they have the same hash value; (4) For any given different message , it is impossible to make their hash values ​​the same. Impossible here means that it is computationally impossible under the existing resource conditions. [0003] The application of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L9/32G06F21/00
Inventor 王世红胡岗
Owner BEIJING NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products