密码学原理技术-第十一章-Hash Functions

文章目录

  • 总结
  • [Why we need hash functions](#Why we need hash functions)
    • [Digital Signature with a Hash Function](#Digital Signature with a Hash Function)
    • [Basic Protocol for Digital Signatures with a Hash Function](#Basic Protocol for Digital Signatures with a Hash Function)
    • [Principal input--output behavior of hash functions](#Principal input–output behavior of hash functions)
  • [Security properties](#Security properties)
    • [The three security requirements of hash functions](#The three security requirements of hash functions)
    • [Why the hash-based digital signature scheme is secure?](#Why the hash-based digital signature scheme is secure?)
    • [Collision Resistance and the Birthday Attack](#Collision Resistance and the Birthday Attack)
  • Algorithms
    • [Constructing Hash Functions from Block Ciphers](#Constructing Hash Functions from Block Ciphers)
    • [Dedicatd Hash Functions -- MD4 family of hash functions](#Dedicatd Hash Functions -- MD4 family of hash functions)
  • [Example: The Secure Hash Algorithm SHA-256](#Example: The Secure Hash Algorithm SHA-256)
    • SHA-2
      • [SHA-256 Preprocessing](#SHA-256 Preprocessing)
      • [The SHA-256 Compression Function](#The SHA-256 Compression Function)
      • [Iteration j in the SHA-256 compression function](#Iteration j in the SHA-256 compression function)
  • 资料

总结

Why we need hash functions

Digital Signature with a Hash Function

Basic Protocol for Digital Signatures with a Hash Function

Principal input--output behavior of hash functions

Security properties

The three security requirements of hash functions


Why the hash-based digital signature scheme is secure?



Collision Resistance and the Birthday Attack





2的80次方是当前计算机可达到的

Algorithms

Constructing Hash Functions from Block Ciphers

每个xi是分组加密的输入长度,最终哈希结果是xn经过e函数的结果

这个反过来了,但最终哈希结果是xn经过e函数的结果

Dedicatd Hash Functions -- MD4 family of hash functions


Example: The Secure Hash Algorithm SHA-256

SHA-2

总体框架

每块大小为 512 位

SHA-256 Preprocessing

The SHA-256 Compression Function



Iteration j in the SHA-256 compression function

资料

  1. 关于许多哈希函数及其规范的概览

  2. 生日悖论(Birthday Paradox)

  3. SHA 标准

  4. CrypTool


相关推荐
Jasmine_llq3 分钟前
《B3953 [GESP202403 一级] 找因数》
算法·因数枚举算法(核心逻辑)·顺序遍历算法·单输入处理·逐行输出处理·整数算术运算
Eward-an16 分钟前
【详细解析】删除有序数组中的重复项 II
数据结构·算法
sg_knight18 分钟前
OpenClaw 能做什么?几个真实使用场景说明
算法·ai·大模型·llm·agent·openclaw·小龙虾
嫂子开门我是_我哥20 分钟前
心电域泛化研究从0入门系列 | 第七篇:全流程闭环与落地总结——系列终篇
人工智能·算法·机器学习
爱学习的小囧24 分钟前
零门槛!VCF 自动化环境登录 vSphere Supervisor 全教程
运维·服务器·算法·自动化·vmware·虚拟化
Book思议-26 分钟前
线性表之顺序表入门:顺序表从原理到实现「增删改查」
数据结构·算法
I_LPL29 分钟前
day52 代码随想录算法训练营 图论专题6
java·数据结构·算法·图论
lxl130739 分钟前
C++算法(11)字符串
开发语言·c++·算法
passxgx43 分钟前
12.3 多维高斯分布与加权最小二乘法
线性代数·算法·最小二乘法
少许极端43 分钟前
算法奇妙屋(三十)-递归、回溯与剪枝的综合问题 3
算法·深度优先·剪枝·数独·n皇后