计算机科学 ›› 2010, Vol. 37 ›› Issue (9): 97-100.

• 计算机网络与信息安全 • 上一篇    下一篇

Hash差分攻击算法研究

周林,韩文报,王政   

  1. (解放军信息工程大学信息研究系 郑州450002)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受863国家重点基金项目(2009AA012417),国家自然科学基金(2007B74)资助。

Research of Differential Attack Algorithms to Hash

ZHOU Lin,HAN Wen-bao,WANG Zheng   

  • Online:2018-12-01 Published:2018-12-01

摘要: Hash函数广泛应用于商业、军事等领域,因此对Hash算法的攻击在理论上和实际应用上都有重要的意义。自王小云教授提出差分攻击算法并攻破SHA-1, MD5 , RIPEMD, MD4以来,对该算法的研究日益受到关注。然而王教授没有给出如何寻找差分和差分路径的方法。国内外专家都猜测她是靠非凡的直觉手工完成的,如何寻找差分和差分路径的方法成为关注的热点。构造差分路径步及到如何处理差分循环移位和选择高概率的充分条件。业已证明,一般情况下,差分位移后有4种情况,并给出了4种情况的概率,最后比较了4种情况的概率。

关键词: MD5,Hash函数,差分攻击,隧道技术,多消息修正方法

Abstract: Hash functions arc widely used in business, military field etc. Therefore, the attack to Hash functions has important meaning in theory and in practical application. Since professor Wang proposed differential attack algorithm and succeeded to break SHA 1, MD5 , RIPEMD,MD4,this algorithm has been paid more and more attention. However, Pro Wang do not supply the method to get difference and differential path. Experts at home and abroad guessed that she made it by hand with her outstanding intuition. Therefore,finding the method to get difference and differential path becomes hotspot. We must tackle the circle shift difference and select the high probability sufficient conditions when constructing the differential path. This paper verified there arc four conditions and gave their probability and compared them with each other.

Key words: MD5,Hash functions, Differential attack, Tunncl technique, Multi-message modification method

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!