一种混沌Hash算法的改进及其性能分析
发布时间:2018-04-25 08:50
本文选题:密码学 + 混沌 ; 参考:《重庆大学》2014年硕士论文
【摘要】:在数据的完整性,消息认证和数字签名等方面Hash函数起到了越来越重要的作用。MD5算法已经被宣告破解,很多经典的单向Hash函数也逐渐暴露出缺陷,怎样能构造出更安全有效的Hash算法成为近年来的研究热点。 2003年,K.W. Wong首次将加密和Hash函数通过混沌联系在一起。这引起了Hash函数研究者的广泛关注。近年来,基于混沌的Hash函数的构造成为了密码学中的研究热点。本论文的主要研究工作如下: (1)论述了混沌的理论基础。。混沌加密作为密码学的新方向,在过去的十年里得到了广泛的发展。混沌密码学已成为现代密码学的一种重要分支,在保护数据安全方面有着巨大的潜力。 (2)着眼于多个方面,详细论述了Hash函数的理论基础。介绍了Hash函数的定义和性质、以及Hash函数在信息保护和认证方面的广泛应用。然后,,介绍了Hash函数的带密钥和不带密钥的两种分类。介绍了混沌的一些特性,如灵敏度和对初始条件的参数的敏感,遍历性,论述了混沌Hash函数在信息认证和信息安全方面有着独特的优势。最后,阐述了Hash函数的常用的构造方法以及对其性能进行评测的常用方法。 (3)对一种基于可变参数的混沌帐篷映射的新的文本Hash函数算法进行分析,发现该算法无法抵抗伪造攻击和弱密码性。本文采用明文扩展和Hash值聚合的方法提高该算法的抗伪造攻击性和抗碰撞性。通过理论分析和实验数据证明改进的算法具有很好的单向性、混乱与扩散性和抗碰撞性。将本算法与经典算法MD5、康小培等发表的基于双混沌映射的文本散列函数算法以及基于混沌查找表的散列函数进行比较,经过分析得到,本算法在抗碰撞性和敏感性方面都体现出了良好的性能。 最后,总结了本文的内容,并指出其不足之处,而后展望了Hash函数的研究前景。
[Abstract]:In the aspects of data integrity, message authentication and digital signature, the Hash function has played a more and more important role. MD5 algorithm has been declared to be cracked, and many classic one-way Hash functions have gradually exposed their defects. How to construct a more secure and effective Hash algorithm has become a hot topic in recent years. In 2003, K. W. Wong first associated encryption with Hash function through chaos. This has attracted the attention of Hash function researchers. In recent years, the construction of Hash functions based on chaos has become a hotspot in cryptography. The main research work of this thesis is as follows: 1) the theoretical basis of chaos is discussed. As a new direction of cryptography, chaotic encryption has been widely developed in the past ten years. Chaotic cryptography has become an important branch of modern cryptography and has great potential in protecting data security. The theoretical basis of Hash function is discussed in detail. This paper introduces the definition and property of Hash function, and the wide application of Hash function in information protection and authentication. Then, two kinds of classification of Hash function with and without key are introduced. Some characteristics of chaos, such as sensitivity, sensitivity to initial conditions, ergodicity and ergodicity, are introduced. The unique advantages of chaotic Hash function in information authentication and information security are discussed. Finally, the common methods of constructing Hash function and evaluating its performance are described. A new text Hash function algorithm based on variable parameter chaotic tent mapping is analyzed. It is found that the algorithm can not resist forgery attacks and weak cryptography. In this paper, plaintext extension and Hash aggregation are used to improve the anti-forgery and anti-collision of the algorithm. Theoretical analysis and experimental data show that the improved algorithm has good unidirectionality, chaos and diffusion, and anti-collision. This algorithm is compared with the classical algorithms MD5, Compai and so on, which are based on the double chaotic mapping and the hash function based on chaotic lookup table. The algorithm has good performance in collision resistance and sensitivity. Finally, this paper summarizes the content of this paper, points out its shortcomings, and then looks forward to the research prospect of Hash function.
【学位授予单位】:重庆大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.1
【参考文献】
相关期刊论文 前7条
1 邓绍江;李艳涛;张岱固;肖迪;;基于混沌查找表的单向Hash函数构造算法[J];计算机工程;2010年10期
2 康小培;李艳涛;邓绍江;冯艳茹;;基于双混沌映射的文本hash函数构造[J];计算机应用研究;2010年07期
3 曹珍富;薛庆水;;密码学的发展方向与最新进展[J];计算机教育;2005年01期
4 冯登国;国内外密码学研究现状及发展趋势[J];通信学报;2002年05期
5 盛利元;李更强;李志炜;;基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J];物理学报;2006年11期
6 刘建东;余有明;;基于可变参数双向耦合映像系统的时空混沌Hash函数设计[J];物理学报;2007年03期
7 何婷婷;罗晓曙;廖志贤;韦正丛;;一种新的混沌映射散列函数构造方法及应用[J];物理学报;2012年11期
本文编号:1800628
本文链接:https://www.wllwen.com/kejilunwen/wltx/1800628.html