密码学原理技术-第十一章-Hash Functions

文章目录

  • 总结
  • [Why we need hash functions](#Why we need hash functions)
    • [Digital Signature with a Hash Function](#Digital Signature with a Hash Function)
    • [Basic Protocol for Digital Signatures with a Hash Function](#Basic Protocol for Digital Signatures with a Hash Function)
    • [Principal input--output behavior of hash functions](#Principal input–output behavior of hash functions)
  • [Security properties](#Security properties)
    • [The three security requirements of hash functions](#The three security requirements of hash functions)
    • [Why the hash-based digital signature scheme is secure?](#Why the hash-based digital signature scheme is secure?)
    • [Collision Resistance and the Birthday Attack](#Collision Resistance and the Birthday Attack)
  • Algorithms
    • [Constructing Hash Functions from Block Ciphers](#Constructing Hash Functions from Block Ciphers)
    • [Dedicatd Hash Functions -- MD4 family of hash functions](#Dedicatd Hash Functions -- MD4 family of hash functions)
  • [Example: The Secure Hash Algorithm SHA-256](#Example: The Secure Hash Algorithm SHA-256)
    • SHA-2
      • [SHA-256 Preprocessing](#SHA-256 Preprocessing)
      • [The SHA-256 Compression Function](#The SHA-256 Compression Function)
      • [Iteration j in the SHA-256 compression function](#Iteration j in the SHA-256 compression function)
  • 资料

总结

Why we need hash functions

Digital Signature with a Hash Function

Basic Protocol for Digital Signatures with a Hash Function

Principal input--output behavior of hash functions

Security properties

The three security requirements of hash functions


Why the hash-based digital signature scheme is secure?



Collision Resistance and the Birthday Attack





2的80次方是当前计算机可达到的

Algorithms

Constructing Hash Functions from Block Ciphers

每个xi是分组加密的输入长度,最终哈希结果是xn经过e函数的结果

这个反过来了,但最终哈希结果是xn经过e函数的结果

Dedicatd Hash Functions -- MD4 family of hash functions


Example: The Secure Hash Algorithm SHA-256

SHA-2

总体框架

每块大小为 512 位

SHA-256 Preprocessing

The SHA-256 Compression Function



Iteration j in the SHA-256 compression function

资料

  1. 关于许多哈希函数及其规范的概览

  2. 生日悖论(Birthday Paradox)

  3. SHA 标准

  4. CrypTool


相关推荐
一只鱼^_8 分钟前
牛客周赛 Round 105
数据结构·c++·算法·均值算法·逻辑回归·动态规划·启发式算法
是阿建吖!9 分钟前
【动态规划】斐波那契数列模型
算法·动态规划
啊阿狸不会拉杆38 分钟前
《算法导论》第 27 章 - 多线程算法
java·jvm·c++·算法·图论
火车叨位去194944 分钟前
力扣top100(day04-05)--堆
算法·leetcode·职场和发展
数据智能老司机44 分钟前
面向企业的图学习扩展——面向图的传统机器学习
算法·机器学习
类球状1 小时前
顺序表 —— OJ题
算法
Miraitowa_cheems2 小时前
LeetCode算法日记 - Day 11: 寻找峰值、山脉数组的峰顶索引
java·算法·leetcode
CoovallyAIHub2 小时前
方案 | 动车底部零部件检测实时流水线检测算法改进
深度学习·算法·计算机视觉
CoovallyAIHub2 小时前
方案 | 光伏清洁机器人系统详细技术实施方案
深度学习·算法·计算机视觉
lxmyzzs2 小时前
【图像算法 - 14】精准识别路面墙体裂缝:基于YOLO12与OpenCV的实例分割智能检测实战(附完整代码)
人工智能·opencv·算法·计算机视觉·裂缝检测·yolo12