MD5算法的分析与研究
[Abstract]:Hash function is an important part of cryptography, it is widely used in e-commerce, information security and e-government security and other areas of high security requirements, but also to achieve digital signature, The MD5 algorithm is a typical representative of the MD structure and is also a member of the Hash function. Therefore, through the research and analysis of MD5 algorithm, we can better understand the basic research method of Hash function. Professor Wang Xiaoyun successfully found the collision message between MD4,MD5,RIPEMD and HAVAL-128 by differential attack. In this paper, the bit tracking technique and message modification technique used in MD5 collision attack are studied. On the basis of this, the general steps of collision attack are summarized: introducing plaintext message difference, selecting differential path and determining the difference condition. Finally, an improved algorithm is proposed to reduce the computational complexity of the collision attack algorithm to a certain extent. In addition, the MD5 algorithm is improved mainly by changing the original nonlinear function, changing the initial value, changing the constant of each cycle and changing the iterative process. The experimental results show that the improved collision attack algorithm reduces the computational complexity to a certain extent. The improved MD5 algorithm has been improved in anti-collision attack, avalanche effect and efficiency.
【学位授予单位】:杭州电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.1
【参考文献】
相关期刊论文 前8条
1 郑世慧;张国艳;杨义先;李忠献;;基于混沌的带密钥散列函数安全分析[J];通信学报;2011年05期
2 毛明;秦志光;陈少晖;;破译MD5算法关键技术探索[J];计算机应用;2009年12期
3 肖皇培;张国基;;基于Hash函数的报文鉴别方法[J];计算机工程;2007年06期
4 盛利元;李更强;李志炜;;基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J];物理学报;2006年11期
5 王张宜,李波,张焕国;Hash函数的安全性研究[J];计算机工程与应用;2005年12期
6 王新兵,马征,黄连生,周宏斌;基于角色冒充对数字签名协议的攻击(英文)[J];软件学报;2001年12期
7 陈勤,江虹;Hash函数的设计与分析[J];杭州大学学报(自然科学版);1999年01期
8 王小云,张全清;MD_5报文摘要算法的各圈函数碰撞分析[J];计算机工程与科学;1996年02期
相关博士学位论文 前2条
1 杨波;密码学Hash函数的设计和应用研究[D];北京邮电大学;2008年
2 黎琳;Hash函数RIPEMD-128和HMAC-MD4的安全性分析[D];山东大学;2007年
相关硕士学位论文 前3条
1 刘飞;Hash函数研究与设计[D];南京航空航天大学;2012年
2 张栋;密码学杂凑函数的碰撞性分析研究[D];西安电子科技大学;2009年
3 梁杰;MD5-Hash函数的安全性分析[D];上海交通大学;2007年
,本文编号:2472121
本文链接:https://www.wllwen.com/jingjilunwen/dianzishangwulunwen/2472121.html