密码学原理技术-第十一章-Hash Functions

文章目录

  • 总结
  • [Why we need hash functions](#Why we need hash functions)
    • [Digital Signature with a Hash Function](#Digital Signature with a Hash Function)
    • [Basic Protocol for Digital Signatures with a Hash Function](#Basic Protocol for Digital Signatures with a Hash Function)
    • [Principal input--output behavior of hash functions](#Principal input–output behavior of hash functions)
  • [Security properties](#Security properties)
    • [The three security requirements of hash functions](#The three security requirements of hash functions)
    • [Why the hash-based digital signature scheme is secure?](#Why the hash-based digital signature scheme is secure?)
    • [Collision Resistance and the Birthday Attack](#Collision Resistance and the Birthday Attack)
  • Algorithms
    • [Constructing Hash Functions from Block Ciphers](#Constructing Hash Functions from Block Ciphers)
    • [Dedicatd Hash Functions -- MD4 family of hash functions](#Dedicatd Hash Functions -- MD4 family of hash functions)
  • [Example: The Secure Hash Algorithm SHA-256](#Example: The Secure Hash Algorithm SHA-256)
    • SHA-2
      • [SHA-256 Preprocessing](#SHA-256 Preprocessing)
      • [The SHA-256 Compression Function](#The SHA-256 Compression Function)
      • [Iteration j in the SHA-256 compression function](#Iteration j in the SHA-256 compression function)
  • 资料

总结

Why we need hash functions

Digital Signature with a Hash Function

Basic Protocol for Digital Signatures with a Hash Function

Principal input--output behavior of hash functions

Security properties

The three security requirements of hash functions


Why the hash-based digital signature scheme is secure?



Collision Resistance and the Birthday Attack





2的80次方是当前计算机可达到的

Algorithms

Constructing Hash Functions from Block Ciphers

每个xi是分组加密的输入长度,最终哈希结果是xn经过e函数的结果

这个反过来了,但最终哈希结果是xn经过e函数的结果

Dedicatd Hash Functions -- MD4 family of hash functions


Example: The Secure Hash Algorithm SHA-256

SHA-2

总体框架

每块大小为 512 位

SHA-256 Preprocessing

The SHA-256 Compression Function



Iteration j in the SHA-256 compression function

资料

  1. 关于许多哈希函数及其规范的概览

  2. 生日悖论(Birthday Paradox)

  3. SHA 标准

  4. CrypTool


相关推荐
yaoh.wang16 小时前
力扣(LeetCode) 13: 罗马数字转整数 - 解法思路
python·程序人生·算法·leetcode·面试·职场和发展·跳槽
T1ssy17 小时前
布隆过滤器:用概率换空间的奇妙数据结构
算法·哈希算法
hetao173383717 小时前
2025-12-12~14 hetao1733837的刷题笔记
数据结构·c++·笔记·算法
鲨莎分不晴18 小时前
强化学习第五课 —— A2C & A3C:并行化是如何杀死经验回放
网络·算法·机器学习
搞科研的小刘选手19 小时前
【ISSN/ISBN双刊号】第三届电力电子与人工智能国际学术会议(PEAI 2026)
图像处理·人工智能·算法·电力电子·学术会议
拉姆哥的小屋19 小时前
从混沌到秩序:条件扩散模型在图像转换中的哲学与技术革命
人工智能·算法·机器学习
Sammyyyyy19 小时前
DeepSeek v3.2 正式发布,对标 GPT-5
开发语言·人工智能·gpt·算法·servbay
sin_hielo20 小时前
leetcode 2110
数据结构·算法·leetcode
Jay200211120 小时前
【机器学习】33 强化学习 - 连续状态空间(DQN算法)
人工智能·算法·机器学习
panzer_maus20 小时前
归并排序的简单介绍
java·数据结构·算法