首页 | 本学科首页   官方微博 | 高级检索  
     

基于三重分组链接的散列函数及其性能分析
引用本文:黄玉划,胡爱群,王兴建.基于三重分组链接的散列函数及其性能分析[J].计算机研究与发展,2006,43(8):1398-1404.
作者姓名:黄玉划  胡爱群  王兴建
作者单位:1. 东南大学信息安全研究中心,南京,210096;南京航空航天大学信息科学与技术学院,南京,210016
2. 东南大学信息安全研究中心,南京,210096
基金项目:国家科技攻关项目;江苏省重点实验室基金
摘    要:提出了一类基于三重分组链接的单向散列函数(HTBC),并论证了其安全性.HTBC算法的速度比常用单向散列函数(SHA和MD系列算法等)快.依赖性测试表明:HTBC算法是完备的;其雪崩效应度约为0.9993;其严格雪崩准则度约为0.992.频率测试表明,可以认为HTBC算法的输出服从均匀分布.二进制矩阵秩测试表明。可以认为HTBC算法的输出子序列间线性独立.Maurer通用统计测试表明,HTBC算法的信息压缩损耗不显著.连续(run)、频谱、非重叠字(non-overlapping template)匹配、重叠字匹配、Lempel—Ziv压缩、线性复杂度、系列、近似熵、累积和、随机游程以及随机游程变量等测试结果都满足要求.由此说明,HTBC算法具有很好的伪随机性,这就从统计评估的角度验证了HTBC算法的安全性.

关 键 词:散列函数  安全性  伪随机性  统计评估
收稿时间:01 10 2005 12:00AM
修稿时间:2005-01-102005-12-06

Triple-Block-Chaining-Based Hash Function and Its Performance Analysis
Huang Yuhua,Hu Aiqun,Wang Xingjian.Triple-Block-Chaining-Based Hash Function and Its Performance Analysis[J].Journal of Computer Research and Development,2006,43(8):1398-1404.
Authors:Huang Yuhua  Hu Aiqun  Wang Xingjian
Abstract:A hash function based on triple-block chaining (HTBC) is put forward and its security is demonstrated. The speed of the HTBC algorithm is faster than that of hash functions in common use (SHA and MD family). The dependence test results accord with the demands. The HTBC algorithm is complete; its degree of avalanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the HTBC algorithm has uniformity. The binary matrix rank test results indicate that it is linear independent among disjoint sub-matrices of the output. Maurer's universal statistical test results show that the output could be significantly compressed without loss of information. The results of run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test, and random excursions variant test all fulfill the requirements. Therefore the output generated by the HTBC algorithm has good pseudo-randomness. Thus the security of the HTBC algorithm is verified by way of statistical evaluation.
Keywords:hash function  security  pseudo-randomness  statistical evaluation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号