Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for structuring one-way Hash function based on random function

A random function and construction method technology, applied in the field of information security, can solve problems such as difficulty for cryptanalysts, difficulty in one-way, and complex algorithm design

Active Publication Date: 2012-07-04
南通信甲天下科技有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2004 and 2005, the research team led by Wang Xiaoyun successively deciphered two major cryptographic algorithms, MD5 and SHA-1, which are widely used in computer security systems all over the world, which aroused great concern and high praise from the international cryptography community. For a fixed function, it is more difficult to ensure this one-way, because in principle, it can be reversed according to the structure of the hash function (although it is one-way, the original text and the hash value are a many-to-one mapping relationship , but with the help of some mathematical methods and calculation tools, it is possible to carry out successful reverse deduction, which provides an entry point for cracking), it is necessary to design the algorithm very complicated
If the algorithm of a hash function is random and uncertain, it is difficult for cryptanalysts to start

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for structuring one-way Hash function based on random function
  • Method for structuring one-way Hash function based on random function
  • Method for structuring one-way Hash function based on random function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following is an example of constructing a random hash function. For convenience and concise description, a relatively short algorithm is used and existing algorithms are used for reference.

[0025] Follow the steps to construct a random hash function:

[0026] The first step is to determine the processed packet length of 512bit.

[0027] The second step is to design the way of padding and additional length information, and pad the message. The first bit is filled with 1, and the subsequent bits are all 0. Fill it to 512n-64. If it happens to be in the form of 512n-64, fill it with 512bit , the first bit is also filled with 1, and the subsequent bits are all 0, n is the smallest integer that meets this condition, and 64 bits are reserved for additional message length, because in reality, the binary length of most messages is generally not Will exceed 64, that is, the length does not exceed 2 64 . When the binary value of the length of the message exceeds 64, that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, in particular to the field of cryptology. The invention relates to a method for structuring a one-way Hash function based on a random function. The method uses a random function as a Hash function, or rather, the method uses the random function as a compression function, namely the compression function is indeterminate and has various possible concrete function forms, and the concrete form of the function is determined through clear text messages during calculation. The Hash function structured by the method brings various obstacles for decoding, a forged clear text needs to conform to the requirements of the traditional deterministic Hash function, and the definite code of the concrete function form of the deterministic random Hash function corresponding to the clear text must be consistent. The current cryptanalysis generally aims at the deterministic Hash function. When a cryptanalyst only knows a Hash value, decoding is even more difficult. As the concrete function form of the random function is not known, the cryptanalyst is unable to start by adopting a general decoding method.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for constructing a one-way hash function based on a random function. Background technique [0002] The existing hash (also translated as hash, hash, hash) function has a fixed structure and function, which provides convenience for cryptanalysis. For the hash function H=Hash(M), it is generally easy to calculate H through M, but it is very difficult to find one or more corresponding M through H, and it often takes a long time under limited computing power. However, in recent years, Wang Xiaoyun has cracked a series of hash functions. In 2004 and 2005, the research team led by Wang Xiaoyun successively deciphered two major cryptographic algorithms, MD5 and SHA-1, which are widely used in computer security systems all over the world, which aroused great concern and high praise from the international cryptography community. For a fixed function, it is more difficult to ens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 王勇
Owner 南通信甲天下科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products