密码学原理技术-第十一章-Hash Functions

文章目录

  • 总结
  • [Why we need hash functions](#Why we need hash functions)
    • [Digital Signature with a Hash Function](#Digital Signature with a Hash Function)
    • [Basic Protocol for Digital Signatures with a Hash Function](#Basic Protocol for Digital Signatures with a Hash Function)
    • [Principal input--output behavior of hash functions](#Principal input–output behavior of hash functions)
  • [Security properties](#Security properties)
    • [The three security requirements of hash functions](#The three security requirements of hash functions)
    • [Why the hash-based digital signature scheme is secure?](#Why the hash-based digital signature scheme is secure?)
    • [Collision Resistance and the Birthday Attack](#Collision Resistance and the Birthday Attack)
  • Algorithms
    • [Constructing Hash Functions from Block Ciphers](#Constructing Hash Functions from Block Ciphers)
    • [Dedicatd Hash Functions -- MD4 family of hash functions](#Dedicatd Hash Functions -- MD4 family of hash functions)
  • [Example: The Secure Hash Algorithm SHA-256](#Example: The Secure Hash Algorithm SHA-256)
    • SHA-2
      • [SHA-256 Preprocessing](#SHA-256 Preprocessing)
      • [The SHA-256 Compression Function](#The SHA-256 Compression Function)
      • [Iteration j in the SHA-256 compression function](#Iteration j in the SHA-256 compression function)
  • 资料

总结

Why we need hash functions

Digital Signature with a Hash Function

Basic Protocol for Digital Signatures with a Hash Function

Principal input--output behavior of hash functions

Security properties

The three security requirements of hash functions


Why the hash-based digital signature scheme is secure?



Collision Resistance and the Birthday Attack





2的80次方是当前计算机可达到的

Algorithms

Constructing Hash Functions from Block Ciphers

每个xi是分组加密的输入长度,最终哈希结果是xn经过e函数的结果

这个反过来了,但最终哈希结果是xn经过e函数的结果

Dedicatd Hash Functions -- MD4 family of hash functions


Example: The Secure Hash Algorithm SHA-256

SHA-2

总体框架

每块大小为 512 位

SHA-256 Preprocessing

The SHA-256 Compression Function



Iteration j in the SHA-256 compression function

资料

  1. 关于许多哈希函数及其规范的概览

  2. 生日悖论(Birthday Paradox)

  3. SHA 标准

  4. CrypTool


相关推荐
2501_941329724 分钟前
YOLOv8-LADH马匹检测识别算法详解与实现
算法·yolo·目标跟踪
洛生&4 分钟前
Planets Queries II(倍增,基环内向森林)
算法
小郭团队37 分钟前
1_6_五段式SVPWM (传统算法反正切+DPWM2)算法理论与 MATLAB 实现详解
嵌入式硬件·算法·matlab·dsp开发
小郭团队1 小时前
1_7_五段式SVPWM (传统算法反正切+DPWM3)算法理论与 MATLAB 实现详解
开发语言·嵌入式硬件·算法·matlab·dsp开发
鱼跃鹰飞1 小时前
Leetcode347:前K个高频元素
数据结构·算法·leetcode·面试
bybitq1 小时前
LeetCode236-二叉树的最近公共祖先(LCA)问题详解-C++
算法·深度优先
啊阿狸不会拉杆1 小时前
《数字图像处理》第 7 章 - 小波与多分辨率处理
图像处理·人工智能·算法·计算机视觉·数字图像处理
程序猿炎义2 小时前
【Easy-VectorDB】Faiss数据结构与索引类型
数据结构·算法·faiss
43v3rY0unG2 小时前
哈希表学习
学习·哈希算法·散列表
天赐学c语言3 小时前
1.20 - x的平方根 && vector的扩容机制以及删除元素是否会释放内存
c++·算法·leecode