Method and device to produce secure hash value

一种安全散列、散列函数的技术,应用在安全通信装置、带移位寄存器/存储器的加密装置、仪器等方向,能够解决安全漏洞等问题

Active Publication Date: 2019-08-06
NAGRAVISION SA
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Storing all user passwords as clear text can lead to a serious security breach if the password file is compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device to produce secure hash value
  • Method and device to produce secure hash value
  • Method and device to produce secure hash value

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] according to figure 1 , illustrating the steps of a method of generating a secure hash. An input message or plaintext P is input into a hashing module to generate a conventional hash value H. Known hashing algorithms are eg MD4, SHA-1 to SHA-256. Where the algorithm uses a seed, the seed is introduced into the module to produce the hash value H.

[0021] The next step is to convert the binary representation of the hash value H into a floating point number U0. The publication IEEE754-2008 gives an example describing how to represent an integer into a floating point representation. The IEEE 754 standard specifies binary 23 as having:

[0022] Sign bit: 1 bit, exponent width: 8 bits, significand precision: 24 bits

[0023] The double-precision floating-point format is a computer number format that occupies 8 bytes (64 bits) in computer memory and expresses a wide dynamic range of values ​​by using floating point. The double-precision floating-point format usually ref...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The generation of hash values become popular with the storage of pin code by an authentication server, since the authentication server knows only the result of the hash function and not the pin code itself. Each time an authentication is requested, a hash function is executed on the received pin code and then compared with the stored reference hash value of the initial pin code. In order to improve the security of the hash value, it is proposed a method to produce a secure hash value (R) from a plaintext (P), the method comprising: producing a first result (H) using an hash function of the plaintext (P), obtaining an initial floating value (U0) by converting the first result (H) into a floating number representation of the first value (H), updating a floating value (Un) by executing at least once a Transcendental function (TF) on the initial floating value (Un-1), obtaining the secure hash value (R) by mixing the first result (H) with the updated floating value (Un).

Description

technical field [0001] Since the authentication server only knows the result of the hash function and not the pin code itself, the generation of the hash value becomes popular when the authentication server stores the pin code. Each time authentication is requested, a hash function is performed on the received PIN, which is then compared to a stored reference hash value of the initial PIN. Therefore, even if the authentication server is compromised and the list of hash values ​​is leaked to a third party, the latter cannot recover the PIN. Background technique [0002] A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The value returned by a hash function is called a hash value, hash code, hash sum, or simply hash. Uses a data structure called a hash table, which is widely used in computer software for fast data lookups. Hash functions speed up table or database lookups by detecting duplicate records in large files. An ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06G06F9/30H04L9/32
CPCH04L9/0643H04L9/3236G06F21/44G06F21/64G06F7/544G06F7/548G06F7/556
Inventor H·皮勒提尔
Owner NAGRAVISION SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products