咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Design theory and method of mu... 收藏

Design theory and method of multivariate hash function

Design theory and method of multivariate hash function

作     者:WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan 430072, China 2 Key Laboratory of Mathematics Mechanization, Beijing 100080, China 

作者机构:The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan China Key Laboratory of Mathematics Mechanization Beijing China 

出 版 物:《Science China(Information Sciences)》 (中国科学:信息科学(英文版))

年 卷 期:2010年第53卷第10期

页      面:1977-1987页

核心收录:

学科分类:07[理学] 070104[理学-应用数学] 0701[理学-数学] 

基  金:supported by the National High-Tech Research & Development Program of China (Grant No.2007AA01Z4) the National Natural Science Foundation of China (Grants Nos. 60970115, 60970116) the Open Project of Key Laboratory of Mathematics Mechanization (Grant No. KLMM0903) 

主  题:cryptology hash function MQ problem multivariate polynomials 

摘      要:This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the current widely used hash algorithms, the new algorithm has the following advantages: its security is based on a recognized difficult mathematical problem; the hash length can be changed freely; its design can be automated such that users may construct specific hash function meeting the actual needs. Furthermore, we discuss the security, efficiency and performance of the new algorithm. Under some related difficult mathematical assumptions and theoretical analysis, the new algorithm is proven practical by the experiment results, and capable of achieving security of an ideal hash function by choosing suitable parameters. In addition, it can also be used as a pseudo-random number generator for the good randomness of its output.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分