Integral nonlinear mapping-based hash function constructing method

A non-linear mapping, hash function technology, applied in the field of information security

Inactive Publication Date: 2010-06-16
BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] According to the background technology, the purpose of the present invention is to overcome the problems existing in the existing chaotic hash function design scheme, and to provide a ha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integral nonlinear mapping-based hash function constructing method
  • Integral nonlinear mapping-based hash function constructing method
  • Integral nonlinear mapping-based hash function constructing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0172] Embodiment 1: apply the present invention to carry out digital signature

[0173] Digital signature is a way to sign and confirm electronic messages transmitted online. It has been used in online security payment systems, electronic banking systems, electronic securities systems, secure mail systems, electronic booking systems, online shopping systems, and online bonded systems. A series of signature authentication services for e-commerce applications. Digital signatures have higher requirements on security and anti-forgery, and require verification speed to be faster than signature speed, especially online real-time verification. At present, the secure hash algorithm (SHA-1) is widely used in the digital signature algorithm. When the security of SHA-1 is seriously threatened, it is necessary to use a more secure hash algorithm. The method of the invention has good security and fast execution speed, and is especially suitable for digital signatures. An example of digi...

Embodiment 2

[0195] Embodiment 2: Apply the present invention to carry out password protection

[0196] The security protection of user accounts is an important technical issue in current e-commerce activities. For the user, the most concerned issue is the confidentiality of the password, and the leakage of the password will lead to the user's account being stolen by others. Usually the user's account information is stored in the user account database. If the user's password is stored in plain text in the database, all individuals who have the right to access the user account database can easily obtain other people's passwords. If a hacker gains access to the user account database, all user passwords will be leaked. If the hash value of the password is stored instead of the password of the user directly in the user account database, the purpose of effectively protecting the password of the user can be achieved. In order to prevent "dictionary" attacks, the hash value of the password is n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technology of information system safety engineering, in particular to an integral nonlinear mapping-based hash function constructing method. The method comprises the following steps of: (1) filling information; (2) setting a group of initial vectors and parameters; (3) performing non-linear segmental code word expansion of message packets; (4) using a coupling mapping system model to make the parallel mode blending iterative operation, and realizing the blending and dispersion of the expanded code words and the link variables; and (5) outputting a variable length hash. The hash function constructing method is mainly used in fields of digital certificates, electric signatures, password protection, digital integrity verification and the like, adopts the nonlinear segmental type code word expansion technology, speeds up the nonlinear dispersion degree of the code words, combines the integral nonlinear mapping and a logic function and has relative ideal blending and dispersing characteristics; the parallel iterative structure is used in the compression function of the method, so that the high-speed parallel realization of software and hardware can be realized conveniently; and the constructing method has high operating efficiency, and the hash function is easily modified, supplemented and maintained.

Description

technical field [0001] The invention relates to a method for constructing a hash function for extracting message abstracts in the field of information security technology, in particular to an integer-based nonlinear mapping widely used in security applications such as digital certificates, electronic signatures, password protection, and integrity verification of digital information. The hash function constructor. Background technique [0002] In the past ten years, the United States, Russia, Europe, Japan, etc. have successively formulated their own Hash function algorithm standards. Security Hash algorithms SHA-1 and SHA-2 are standard algorithms of the National Institute of Standards and Technology (NIST); RIPEMD-160 is a standard Hash algorithm developed under the European Community PIPE program, and its output is 160bit; GOSTHash algorithm is a Russian National standard, its output is 256bit; N-Hash algorithm was invented by Nippon Telegraph and Telephone Company. But ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 刘建东
Owner BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products