密码学原理技术-第十一章-Hash Functions

文章目录

  • 总结
  • [Why we need hash functions](#Why we need hash functions)
    • [Digital Signature with a Hash Function](#Digital Signature with a Hash Function)
    • [Basic Protocol for Digital Signatures with a Hash Function](#Basic Protocol for Digital Signatures with a Hash Function)
    • [Principal input--output behavior of hash functions](#Principal input–output behavior of hash functions)
  • [Security properties](#Security properties)
    • [The three security requirements of hash functions](#The three security requirements of hash functions)
    • [Why the hash-based digital signature scheme is secure?](#Why the hash-based digital signature scheme is secure?)
    • [Collision Resistance and the Birthday Attack](#Collision Resistance and the Birthday Attack)
  • Algorithms
    • [Constructing Hash Functions from Block Ciphers](#Constructing Hash Functions from Block Ciphers)
    • [Dedicatd Hash Functions -- MD4 family of hash functions](#Dedicatd Hash Functions -- MD4 family of hash functions)
  • [Example: The Secure Hash Algorithm SHA-256](#Example: The Secure Hash Algorithm SHA-256)
    • SHA-2
      • [SHA-256 Preprocessing](#SHA-256 Preprocessing)
      • [The SHA-256 Compression Function](#The SHA-256 Compression Function)
      • [Iteration j in the SHA-256 compression function](#Iteration j in the SHA-256 compression function)
  • 资料

总结

Why we need hash functions

Digital Signature with a Hash Function

Basic Protocol for Digital Signatures with a Hash Function

Principal input--output behavior of hash functions

Security properties

The three security requirements of hash functions


Why the hash-based digital signature scheme is secure?



Collision Resistance and the Birthday Attack





2的80次方是当前计算机可达到的

Algorithms

Constructing Hash Functions from Block Ciphers

每个xi是分组加密的输入长度,最终哈希结果是xn经过e函数的结果

这个反过来了,但最终哈希结果是xn经过e函数的结果

Dedicatd Hash Functions -- MD4 family of hash functions


Example: The Secure Hash Algorithm SHA-256

SHA-2

总体框架

每块大小为 512 位

SHA-256 Preprocessing

The SHA-256 Compression Function



Iteration j in the SHA-256 compression function

资料

  1. 关于许多哈希函数及其规范的概览

  2. 生日悖论(Birthday Paradox)

  3. SHA 标准

  4. CrypTool


相关推荐
白羊by2 小时前
YOLOv1~v11 全版本核心演进总览
深度学习·算法·yolo
墨尘笔尖3 小时前
最大最小值降采样算法的优化
c++·算法
white-persist5 小时前
【vulhub shiro 漏洞复现】vulhub shiro CVE-2016-4437 Shiro反序列化漏洞复现详细分析解释
运维·服务器·网络·python·算法·安全·web安全
FL16238631296 小时前
基于C#winform部署软前景分割DAViD算法的onnx模型实现前景分割
开发语言·算法·c#
baizhigangqw6 小时前
启发式算法WebApp实验室:从搜索策略到群体智能的能力进阶
算法·启发式算法·web app
C雨后彩虹7 小时前
最多等和不相交连续子序列
java·数据结构·算法·华为·面试
cpp_25018 小时前
P2347 [NOIP 1996 提高组] 砝码称重
数据结构·c++·算法·题解·洛谷·noip·背包dp
Hugh-Yu-1301238 小时前
二元一次方程组求解器c++代码
开发语言·c++·算法
编程大师哥8 小时前
C++类和对象
开发语言·c++·算法
加农炮手Jinx9 小时前
LeetCode 146. LRU Cache 题解
算法·leetcode·力扣