节点文献

基于三重分组链接的散列函数及其性能分析

Triple-Block-Chaining-Based Hash Function and Its Performance Analysis

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 黄玉划胡爱群王兴建

【Author】 Huang Yuhua~ 1,2 , Hu Aiqun~1, and Wang Xingjian~1 ~ 1 (Research Center of Information Security, Southeast University, Nanjing 210096) ~ 2 (College of Information Science & Technology, Nanjing University of Aeronautics & Astronautics, Nanjing 210016)

【机构】 东南大学信息安全研究中心东南大学信息安全研究中心 南京210096南京航空航天大学信息科学与技术学院南京210016南京210096

【摘要】 提出了一类基于三重分组链接的单向散列函数(HTBC),并论证了其安全性·HTBC算法的速度比常用单向散列函数(SHA和MD系列算法等)快·依赖性测试表明:HTBC算法是完备的;其雪崩效应度约为0·9993;其严格雪崩准则度约为0·992·频率测试表明,可以认为HTBC算法的输出服从均匀分布·二进制矩阵秩测试表明,可以认为HTBC算法的输出子序列间线性独立·Maurer通用统计测试表明,HTBC算法的信息压缩损耗不显著·连续(run)、频谱、非重叠字(non-overlappingtemplate)匹配、重叠字匹配、Lempel-Ziv压缩、线性复杂度、系列、近似熵、累积和、随机游程以及随机游程变量等测试结果都满足要求·由此说明,HTBC算法具有很好的伪随机性,这就从统计评估的角度验证了HTBC算法的安全性·

【Abstract】 A hash function based on triple-block chaining (HTBC) is put forward and its security is demonstrated. The speed of the HTBC algorithm is faster than that of hash functions in common use (SHA and MD family). The dependence test results accord with the demands. The HTBC algorithm is complete; its degree of avalanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the HTBC algorithm has uniformity. The binary matrix rank test results indicate that it is linear independent among disjoint sub-matrices of the output. Maurer’s universal statistical test results show that the output could be significantly compressed without loss of information. The results of run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test, and random excursions variant test all fulfill the requirements. Therefore the output generated by the HTBC algorithm has good pseudo-randomness. Thus the security of the HTBC algorithm is verified by way of statistical evaluation.

【基金】 国家“八六三”高技术研究发展计划基金项目(2003AA143040,2005AA147040);江苏省网络与信息安全重点实验室基金项目(BM2003201)~~
  • 【文献出处】 计算机研究与发展 ,Journal of Computer Research and Development , 编辑部邮箱 ,2006年08期
  • 【分类号】TP301
  • 【被引频次】2
  • 【下载频次】113
节点文献中: 

本文链接的文献网络图示:

本文的引文网络