Method for obtaining safe information abstract in authentication header

A security message and authentication protocol technology, applied in the field of network security, can solve the problem of insufficient computation, and achieve the effect of improving efficiency and high security

Inactive Publication Date: 2012-08-29
HANGZHOU DIANZI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the security of SHA-1 is constantly being challenged, the huge amount of calculation required to crack the algorithm is meaningless for the current hardware level.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining safe information abstract in authentication header

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] A method for obtaining a security message digest in an authentication protocol includes the following steps:

[0066] Step (1) Add a 1 and a number of 0s (at least 1 and at most 512) after the message to be processed, so that the length of the message becomes 448 after the remainder of 512;

[0067] Step (2) Add a 64-bit binary string after the newly obtained message. The value of the binary string is the original length of the message. At this time, the length of the message is a multiple of 512. Then the message is expanded and grouped to make the original 512-bit The packet becomes a 1024-bit packet, that is, adjacent 512-bit packets form a new 1024-bit packet.

[0068] In the SHA-1 algorithm, the length is less than 2 64 After the message is put together, it is divided into multiple 512-bit packets, one packet at a time. The algorithm first expands the original 512-bit or 16 32-bit words into 80 32-bit words according to certain rules, which is used to meet the requiremen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a modified SHA-1 hash algorithm. The existing SHA-1 harsh algorithm has low security. The invention firstly adds a 1, a plurality of 0 and a 64-bit binary string after the information to be processed, then enlarges and groups the information, so the original 512-bit group is changed into a 1024-bit group and a register value is initialized; then a main cycle is utilized to sequentially process each group, the main cycle totally has four operations, and each operation contains logical function and compression function processing; and finally, after the processing of all the groups is completed, 160-bit message digest is output, and when the message digest is transferred, the message to be transferred is added with a safety hashed value. Through the algorithm of theinvention, the original SHA-1 algorithm has more safety on message processing, and through modifying the logical function expression and the compression function logical structure of the algorithm, the efficiency of the SHA-1 algorithm is improved.

Description

Technical field [0001] The invention belongs to the technical field of network security, and specifically relates to a method for obtaining a security message digest in an authentication protocol. Background technique [0002] Digital signature is an important information security technology. It is widely used in the field of network information exchange. In many types of digital signature technologies, a special type of mathematical algorithm-hash algorithm is usually used. It occupies an extremely important position in the signature technology. At present, the common hash algorithms are MD5, SHA-1 and RIPEMD-160, and China tends to use MD5 and SHA-1. From the current point of view, SHA-1 has become the most widely used algorithm due to its advantages in security strength and computational efficiency. [0003] The SHA-1 algorithm was designed by the National Institute of Standards and Technology and the National Security Agency, and was adopted by the U.S. government as the U.S....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/15H04L29/06
Inventor 吴卿张奇锋倪永军周兴武金恭华赵俊杰郁伟炜吴鹏曾虹
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products