CN101414904A - Hash function method with single-wheel time anti-collision - Google Patents

Hash function method with single-wheel time anti-collision Download PDF

Info

Publication number
CN101414904A
CN101414904A CNA2008102258686A CN200810225868A CN101414904A CN 101414904 A CN101414904 A CN 101414904A CN A2008102258686 A CNA2008102258686 A CN A2008102258686A CN 200810225868 A CN200810225868 A CN 200810225868A CN 101414904 A CN101414904 A CN 101414904A
Authority
CN
China
Prior art keywords
coupling
information
value
mapping
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008102258686A
Other languages
Chinese (zh)
Inventor
王世红
胡岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Normal University
Original Assignee
Beijing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Normal University filed Critical Beijing Normal University
Priority to CNA2008102258686A priority Critical patent/CN101414904A/en
Publication of CN101414904A publication Critical patent/CN101414904A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention discloses a kind of hash function method, belong to field of information security technology with single-wheel time anti-collision.Described method comprises: with coupling mapping grid is model, the method that adopts floating-point operation and traditional bit operating to combine.The mode that the coupling mapping adopts local and whole coupling to combine, the state variable in the mapping are determined that by the chain variable parameter in the mapping is determined by input information and its extend information.Input information is expanded by non-linear ff (comprising cyclic shift, modulo addition and the operation of S box) operation.Introduce two whole coupling variables, whole coupling variable is the function of whole input informations and state variable.To the output variable delivery, make XOR with chain variable, the information of input; The real numberization as a result that will obtain again is as the input value continuation iteration of mapping.The present invention is with the inferior high complexity of single-wheel, and the calculation cost of less round ensures its fail safe.This method is of a tightly knit structure, and output hashed value length can change, and is easy to software and realizes, also can realize by embedded type CPU technology hardware.

Description

Hash function method with single-wheel time anti-collision
Technical field
The present invention relates to field of information security technology, or rather, design a kind of hash function method.
Background technology
Hash function also claims one-way hash function, is that a kind of message compression with random length is the function of eap-message digest (also claiming hashed value) with regular length.The function that satisfies this condition is a lot, but hash function also requires to satisfy following characteristic: (1) is easy to calculate its hashed value to given message; (2) given hashed value, calculating former message according to hash function is that calculating is gone up impossible; (3) given message and hashed value will find another different message, and it is impossible making them have identical hashed value; (4) to any given different messages, it is impossible making their hashed value identical.Can not be meant under the existing resources condition here is impossible in the calculating.
The application of hash function aspect information security is mainly reflected in the digital signature.Along with being extensive use of of information technology and network, the particularly fast development of e-commerce and e-government and universal, the application demand of digital signature is increasing.In digital signature, because the arithmetic speed of asymmetric arithmetic is slower,, again the information hashed value is carried out digital signature so in digital signature protocol, at first will utilize hash function to generate the information hashed value, can improve signature efficient widely like this.Hash function is except being used in digital signature, and " digital finger-print " of all right spanned file prevents the malicious sabotage to data.File is carried out hashed value calculate, and compare, just can find whether existing file is modified with original " fingerprint " that leave place of safety in.Hash function can also be used in the authentication protocol." authentication " can be interpreted as identifying authority.Whether the authentication square tube is crossed the comparison of Hash functional value, judge to being crossed authentication by the authentication square tube.
At present existing a lot of hash function algorithms, that wherein more famous is MD4, MD5, RIPEMD, HAVAL and SHA series.Calendar year 2001 and 2002 American National Standard technical research institute promulgation SHA-1, SHA-256, SHA-384 and SHA-512 are the hash function standard.Europe was at definite Whirlpool in 2003, and SHA-256, SHA-384 and SHA-512 are the hash function standard.Because MD4 and HAVAL algorithm are decoded in succession, especially in recent years, MD5 and SHA-1 hash function standard have successfully been decoded by the China Wang Xiaoyun of Shandong University professor group, this has caused vibrations in the world, make people's sight focus on hash function once more, analytical method and method for designing that the U.S. more organized international conference that hash function is discussed specially in 2006 make the hash function of design safety become a research focus.
Existing hash function is seldom introduced and is resolved floating-point arithmetic operation based on the bit algebraic manipulation.Reason one is that the former helps the hardware realization, the 2nd, be easy to realize collision to resolving computing with the parsing inverse operation.Under so flourishing at network in the environment that computer is popularized, software resource is to the utmost in practice be general and easy, if bit operating and parsing computing are combined, the hash function method that designs high efficiency and high security is very significant.Even implement also can use the embedded type CPU means to realize the system that parsing computing and bit algebraic manipulation combine to hardware.To resolving the security vulnerabilities of inverse operation, can be overcome by the method for resolving computing and bit operating combination.
Summary of the invention
Existing hash function is strengthened its fail safe with the calculating of many rounds mostly, but is usually covering the related weakness that some can calculate collision in the iteration of surface complexity between each round.The present invention will provide a kind of new safe, crash-resistant hash function method, and the fail safe of system is not that the complexity that relies on many rounds realizes, but relies on the inferior high-strength complex polygamy of single-wheel to realize.
Scheme of the present invention is: with coupling mapping grid is model, the method that adopts floating-point operation and traditional bit operating to combine.Utilize the bit algebraic manipulation to increase the difficulty of seeking collision by the parsing computing, utilize again and resolve obscuring and diffusion rate of nonlinear operation increase bit, to reach the purpose of the anti-crashworthiness of raising system.The mode that the coupling mapping adopts local and whole coupling to combine, the state variable in the mapping are determined that by the chain variable parameter in the mapping is determined by input information and its extend information.The single-wheel of system time computing just possesses the desired anti-impact strength of hash function, and the fail safe that this hash function is used has more been guaranteed in two round computings.
Realize the scheme of the object of the invention, its process feature is to comprise four steps: preliminary treatment, and calculation of parameter, coupling mapping grid Equation for Calculating and hashed value output:
A1) preliminary treatment.Preliminary treatment comprises definite initial chaining value (ICV), and information shaping and information transform.
A2) calculation of parameter.Calculation of parameter comprises that the init state variable of coupling mapping grid equation calculates and the real number conversion of information.
A3) coupling mapping grid Equation for Calculating.Adopt N lattice point coupling model, local is tied mutually with whole coupling
Close.
A4) hashed value output.The output valve of last group information of cascade is as the hashed value of function.
At A1) in, preliminary treatment is by definite initial chaining value (ICV), and information shaping and information transform three steps and form:
A1.1) defining constant.Determine N 32 bit initial chaining value (ICV) H 1, H 2..., H N(method is seen embodiment B2), N are integer, and N can be taken as 4,6,8,12 or 16.
A1.2) the information shaping is that prime information is replenished the position by filling, and adds the original text length information, and making the shaping message length is the integral multiple process of block length.Every group of information fixed number of bits is 32N, and shaping the source language message length is the 32Nn bit, and n is an integer.
Described process by the source language message generation shaping information further comprises:
When the source language message length is not (32Nn-128) bit, behind original text, the level add one 1 and several 0.Wherein 128 fixedly are used for identifying original text length.
A1.3) every group of 32N Bit String turns to N 32 bit integer m 1, m 2..., m N(arrange 32 Bit String i 31i 30... i 1i 0In, i 31Be most significant bit, i 0Be significant bits).
At A2) in, calculation of parameter comprises the calculating of init state variable, the expansion of information and the real number conversion of information of coupling mapping grid equation, concrete grammar is as follows:
A2.1) init state variable.There is N coupling mapping grid grid in system, and its N variable-definition is x 1, x 2..., x N-1, x N, each variable double precision real number representation.Integer H 1, H 2..., H NAssignment is given z 1, z 2..., z N, and be converted into the double precision real number, shine upon the initial state state variable of grid equation as coupling:
z i=H i,i=1,2,...,N
x i = z i 2 32 , ?i=1,2,...,N
A2.2) expansion of information.Is the 32N bit expanded of input the 64N bit, promptly N 32 bit integer m 1, m 2..., m NExpand to 2N 32 bit integer.Extended mode is:
m i+N=ff(m i),i=1,2,...,N
ff(m i)=g[R(m i)]
=g[(m i>>>4)∧(m i>>>8)∧(m i>>>16)∧(m i<<<8)],i=1,2,...,N
Ff is a nonlinear transformation.(x〉〉〉t) expression x cyclic shift t bit to the right wherein, (x<<<t) expression x cyclic shift t bit left, ∧ is for pressing the bit XOR.
A2.3) information of input and expansion changes the double precision real number into:
a i = 3.0 + m i 2 32 , ? b i = 0.25 + m i + N 2 34 , ?i=1,2,...,N
A2.2) the ff conversion in the expansion of related information comprises cyclic shift R and g conversion:
A2.2.1) cyclic shift R.32 bit informations are made 4 different cyclic shifts, and the result presses the bit XOR.
R(m i)=(m i>>>4)∧(m i>>>8)∧(m i>>>16)∧(m i<<<8),i=1,2,...,N
A2.2.2) the g conversion is 32 bit inputs, the nonlinear transformation (seeing Fig. 1 and table 1) of 32 bits output.At first 32 bits of input are divided into four byte A 4‖ A 3‖ A 2‖ A 1, each byte is 8 bits, wherein A 4It is the higher bit position.Each byte is carried out the conversion of S box.The most last output S (A of 4 byte align of conversion 4) ‖ S (A 3) ‖ S (A 2) ‖ S (A 1).
A2.2.3) S box conversion.The conversion of S box is the inputs of 8 bits, the mapping transformation at random of 8 bits output.X in the table 1, y is respectively hexadecimal number, and x|y represents that 8 bit integer imported, x are high-order, and y is a low level.Value in the table 1 is the S (x|y) of corresponding output, and output valve is a hexadecimal representation.
At A3) be coupled to shine upon and adopt local and whole the coupling to combine in the grid Equation for Calculating.Adopt N lattice point coupling model,
Specific implementation has following step:
A3.1) the mapping equation structure is:
y 1=f 1(a 1,x 1)+f 2(b N,k N,x N)+f 1(a 2,u)+f 2(b 3,k 3,w),
y 2=f 1(a 2,x 2)+f 2(b 1,k 1,x 1)+f 1(a 3,u)+f 2(b 4,k 4,w),
y i=f 1(a i,x i)+f 2(b i-1,k i-1,x i-1)+f 1(a i+1,u)+f 2(b i+2,k i+2,w),i=3,4,...,N-2
y N-1=f 1(a N-1,x N-1)+f 2(b N-2,k N-2,x N-2)+f 1(a N,u)+f 2(b 1,k 1,w),
y N=f 1(a N,x N)+f 2(b N-1,k N-1,x N-1)+f 1(a 1,u)+f 2(b 2,k 2,w)
f 1And f 2Be respectively secondary and once mapping, variable u, the real variable that w is coupled to form by N lattice point, equation is by variable u, and w realizes whole coupling.k 1, k 2..., k NIt is the double precision constant (concrete numerical value and production method are seen B3) of input.
A3.2) state variable is carried out the H of delivery and input i, information m iMake XOR, variable is as new z iOutput, and be converted into real number:
z i=y i×2 48mod2 32
Figure A200810225868D00111
?i=1,2,...,N.
x i = z i 2 32
Boundary condition satisfies m N+i=m i, H N+i=H i, i=1,2 ..., N.
A3.3) carry out A3.1 continuously) and A3.2) operation p time after, output variable z 1, z 2..., z N-1, z N
A3.4) upgrade the chain value.Output variable z 1, z 2..., z N-1, z NAs new H iOutput, that is:
H i=z i,i=1,2,...,N
H iInitial value as next group hash function calculates expressly carries out A1 to next group), A2) and calculating A3).
At A3.1) in, function f 1, f 2With whole coupling variable u, w specific implementation method is as follows:
A3.1.1) f 1Mapping: f 1(c, x)=cx (1-x).C is the parameter of mapping, at A2.3) in determine by information.
A3.1.2) f 2Mapping: f 2(c, k, x)=c (x+k).C is the parameter of mapping, at A2.3) in determine by information.K is a constant, and concrete numerical value and production method are seen embodiment B3.
A3.1.3) variable u is constructed by following formula:
u 1 = &Sigma; i = 1 N f 2 ( b i , k i , x i ) ,
u 2=u 1×2 48mod?2 32
u 3=ff(u 2),
u = u 3 2 32 ,
A3.1.4) variable w is constructed by following formula:
w 1 = &Sigma; i = 1 N f 1 ( a i , x i ) ,
w 2=w 1×2 48mod?2 32
w 3=ff(w 2),
w = w 3 2 32
At A4) in, hashed value when output, import all information repeating step A1), A2) and A3), until last group information.The H of last group information of cascade i, i=1,2 ..., N is as last hashed value H 1‖ H 2‖ ... ‖ H N-1. ‖ H NOutput.
The present invention is based on the hash function method of coupling mapping grid pattern, on algorithm structure with famous MD4, MD5, RIPEMD, SHA series, differences such as Whirlpool, adopt the fail safe of (p=2) computing assurance system of few round, and the fail safe of system can be operated with single-wheel and analyzes, analyze simple, good reliability.The hash function of the present invention's design is flexible, effectively.Under the condition that does not change project organization, only need requirement according to the output hashed value, can reach requirement by the number of selecting the coupling lattice point.N=4,6,8,12,16 corresponding respectively output 128,192,256,384 and 512 bit hash value.When the output hashed value increased, computational efficiency did not descend, and this point is better than known most of hash function methods.The above method conveniently is applied to software and uses, and can be used for hardware environment under embedding CPU condition.
Description of drawings
Fig. 1 is a g conversion schematic diagram of the present invention.
Table 1 is a S box of the present invention mapping table at random.
Embodiment
B1) the present invention designs five kinds of hashed values 128,192,256,384 and 512 bits altogether, according to the hashed value requirement, selects the number of coupling lattice point.Concrete enforcement parameter is as follows:
B1.1) coupling lattice point number N=4, iteration round p=2 exports 128 bit hash value.
B1.2) coupling lattice point number N=6, iteration round p=2 exports 192 bit hash value.
B1.3) coupling lattice point number N=8, iteration round p=2 exports 256 bit hash value.
B1.4) coupling lattice point number N=12, iteration round p=2 exports 384 bit hash value.
B1.5) coupling lattice point number N=16, iteration round p=2 exports 512 bit hash value.
B2) the present invention needs definite initial condition value H when realizing 1, H 2..., H NTo the hashed value output of different bits, H 1, H 2..., H NThe value implementation method is as follows:
Work as N=4,6,12,16 o'clock, H i = int [ ln ( 1 + i N + 1 &times; 1.718 ) &times; 2 32 ] , i=1,2,...,N。
When N=8, H i = int [ ln ( 1 + i N + 3 &times; 1.718 ) &times; 2 32 ] , i=1,2,...,N。Int represents the fractions omitted part, only keeps integer part.
According to the method described above, H 1, H 2..., H NValue following (with hexadecimal representation):
B2.1) coupling lattice point number N=4, four initial value value H 1=91ED38AA, H 2=BC4AC89D, H 3=D8A01D1A, H 4=EE4B30CB.
B2.2) coupling lattice point number N=6, six initial value value H 1=8018B519, H 2=A6C50F56, H 3=C0EDC832, H 4=D514141C, H 5=E59AD573, H 6=F3ADFDEE.
B2.3) coupling lattice point number N=8, eight initial value value H 1=6ADA291D, H 2=8CB280AB, H 3=A3EFC179, H 4=B6030647, H 5=C4F176FB, H 6=D1BB3843, H 7=DCF3E6BF, H 8=E6F91BB7.
B2.4) coupling lattice point number N=12,12 initial value value H 1=63C1258E, H 2=83DF84C4, H 3=9A0BEFB1, H 4=AB5AC599, H 5=B9B0AE14, H 6=C5FE6CFD, H 7=D0CF18EC, H 8=DA7B1242.H 9=E33E5756,H 10=EB43ABBF,H 11=F2AAB63B,H 12=F98B9A28。
B2.5) coupling lattice point number N=16,16 initial value value H 1=592B1196, H 2=76992425, H 3=8B16AC27, H 4=9B2C65DA, H 5=A88D7C2D, H 6=B4131777, H 7=BE3B2292, H 8=C755E0A4.H 9=CF99F4BD,H 10=D72E69A4,H 11=DE303559,H 12=E4B57966,H 13=EACF8964,H 14=F08C3CA7,H 15=F5F6D254,H 16=FB18903E。
B3) the present invention needs definite constant value k when realizing 1, k 2..., k NInput.To the hashed value output of different bits, k 1, k 2..., k NThe value implementation method is as follows:
Work as N=4,6,12,16 o'clock, k i = cos ( i N + 1 ) , ?i=1,2,...,N。
When N=8, k i = cos ( i N + 3 ) , i=1,2,...,N。
According to the method described above, k 1, k 2..., k NValue is as follows:
B3.1) coupling lattice point number N=4, four constant value k 1=0.9801, k 2=0.9211, k 3=0.8253, k 4=0.6967.
B3.2) coupling lattice point number N=6, six constant value k 1=0.9898, k 2=0.9595, k 3=0.9096, k 4=0.8411, k 5=0.7556, k 6=0.6546.
B3.3) coupling lattice point number N=8, eight constant value k 1=0.9959, k 2=0.9835, k 3=0.9630, k 4=0.9346, k 5=0.8985, k 6=0.8549, k 7=0.8043, k 8=0.7470.
B3.4) coupling lattice point number N=12,12 constant value k 1=0.9970, k 2=0.9882, k 3=0.9735, k 4=0.9530, k 5=0.9269, k 6=0.8954, k 7=0.8585, k 8=0.8166, k 9=0.7698, k 10=0.7184, k 11=0.6629, k 12=0.6034.
B3.5) coupling lattice point number N=16,16 constant value k 1=0.9983, k 2=0.9931, k 3=0.9845, k 4=0.9724, k 5=0.9571, k 6=0.9384, k 7=0.9164, k 8=0.8913, k 9=0.8631, k 10=0.8319, k 11=0.7979, k 12=0.7610, k 13=0.7216, k 14=0.6796, k 15=0.6353, k 16=0.5888.
B4) the present invention utilizes software programming to implement.Programming in implementing all real numbers adopt the double-precision floating point computings to realize that numerical value rounds and all integers are defined as 32 bit length integers, S box (input of 8 bits and the output of 8 bits) 1 is realized by tabling look-up.
B5) the g conversion for example.X is respectively 0 and 075BCD15 (hexadecimal representation), calculates g (x) value.
0 is divided into four bytes, A 4=0, A 3=0, A 2=0, A 1=0.S (A tables look-up 4)=B5, S (A 3)=B5, S (A 2)=B5, S (A 1)=B5.g(0)=B5B5B5B5。
075BCD15 is divided into four bytes, A 4=07, A 3=5B, A 2=CD, A 1=15.S (A tables look-up 4)=08, S (A 3)=B8, S (A 2)=C6, S (A 1)=A3.
g(075BCD15)=08B8C6A3。
Table .1
Figure A200810225868D00161

Claims (10)

1. one kind is model with coupling mapping grid, the hash function method that adopts floating-point operation and traditional bit operating to combine, local and the whole mode that is coupled and combines are adopted in the mapping that it is characterized in that being coupled, state variable in the mapping is determined that by the chain variable parameter in the mapping is determined by input information and its extend information.Input information is expanded by nonlinear operation.Introduce two whole coupling variables, whole coupling variable is the function of whole input informations and state variable.To the output variable delivery, make XOR with chain variable, the information of input then; The real numberization as a result that will obtain again is as the input value continuation iteration of mapping.Described method comprises following treatment step:
A1) preliminary treatment.Preliminary treatment comprises definite initial chaining value (ICV), and information shaping and information transform.
A2) calculation of parameter.Calculation of parameter comprises that the init state variable of coupling mapping grid equation calculates and the real number conversion of information.
A3) coupling mapping grid Equation for Calculating.Adopt N lattice point coupling model, local and whole coupling combine.
A4) hashed value output.The output valve of last group information of cascade is as the hashed value of function.
2. hash function method according to claim 1 is characterized in that hashed value can select.Coupling grid number is got N=4, the hashed value function of 6,8,12,16 corresponding respectively output 128,192,256,384 and 512 bits.
3. preliminary treatment according to claim 1 is characterized in that by definite initial chaining value (ICV), and information shaping and information transform three steps to be formed, specific as follows:
A1.1) defining constant.Determine N 32 bit initial chaining value (ICV) H 1, H 2..., H N
A1.2) the information shaping is that prime information is replenished the position by filling, and adds the original text length information, and making the shaping message length is the integral multiple of block length.Every group of information fixed number of bits is 32N, and shaping the source language message length is the 32Nn bit, and n is an integer.
Described process by the source language message generation shaping information further comprises:
When the source language message length is not (32Nn-128) bit, behind original text, the level add one 1 and several 0.Wherein 128 fixedly are used for identifying original text length.
A1.3) every group of 32N Bit String turns to N 32 bit integer m 1, m 2..., m N(arrange 32 Bit String i 31i 30... i 1i 0In, i 31Be most significant bit, i 0Be significant bits).
4. calculation of parameter according to claim 1 is characterized in that being made of the calculating of init state variable, the expansion of information and the real number step of converting of information of coupling mapping grid equation, and is specific as follows:
A2.1) H 1, H 2..., H NAssignment is given z 1, z 2..., z N, and be converted into the double precision real number, shine upon the initial state state variable of grid equation as coupling:
z i=H i,i=1,2,...,N
x i = z i 2 32 , i = 1,2 , . . . , N
A2.2) the 32N bit (m of input 1, m 2..., m N) expand to 64N (m 1, m 2..., m 2N) bit, extended mode is m I+N=ff (m i), i=1,2 ..., N.
A2.3) information of input and expansion turns to the double precision real number:
a i = 3.0 + m i 2 32 , b i = 0.25 + m i + N 2 34 , i = 1,2 , . . . , N .
5. extended mode according to claim 4 is characterized in that comprising cyclic shift R and g conversion, and is specific as follows:
A2.2.1) cyclic shift R.32 bit informations are made 4 different cyclic shifts, and the result presses the bit XOR.
R(m i)=(m i>>>4)∧(m i>>>8)∧(m i>>>16)∧(m i<<<8),i=1,2,...,N
A2.2.2) the g conversion is 32 bit inputs, the nonlinear transformation of 32 bits output.At first 32 bits of input are divided into four byte A 4|| A 3|| A 2|| A 1, each byte is 8 bits, wherein A 4It is the higher bit position.Each byte is carried out the conversion of S box.The most last output S (A of 4 byte align of conversion 4) || S (A 3) || S (A 2) || S (A 1).
A2.2.3) conversion of S box is the inputs of 8 bits, the mapping transformation at random of 8 bits output.
6. coupling mapping grid Equation for Calculating according to claim 1 is characterized in that adopting local and whole coupling to combine, and specific implementation has following step:
A3.1) the mapping equation structure is:
y 1=f 1(a 1,x 1)+f 2(b N,k N,x N)+f 1(a 2,u)+f 2(b 3,k 3,w),
y 2=f1(a 2,x 2)+f 2(b 1,k 1,x 1)+f 1(a 3,u)+f 2(b 4,k 4,w),
y i=f 1(a i,x i)+f 2(b i-1,k i-1,x i-1)+f 1(a i+1,u)+f 2(b i+2,k i+2,w),i=3,4,...,N-2
y N-1=f 1(a N-1,x N-1)+f 2(b N-2,k N-2,x N-2)+f 1(a N,u)+f 2(b 1,k 1,w),
y N=f 1(a N,x N)+f 2(b N-1,k N-1,x N-1)+f 1(a 1,u)+f 2(b 2,k 2,w)
A3.2) state variable is carried out the H of delivery and input i, information m iMake XOR, variable is as new z iOutput, and be converted into real number:
z i=y i×2 48mod2 32
Figure A200810225868C00041
x i = z i 2 32
Boundary condition satisfies m N+i=m i, H N+i=H i, i=1,2 ..., N.
A3.3) carry out A3.1 continuously) and A3.2) operation p time after, output variable z 1, z 2..., z N-1, z N
A3.4) upgrade the chain value.Output variable z 1, z 2..., z N-1, z NAs new H iOutput, that is:
H i=z i,i=1,2,...,N。
7. f according to claim 6 1, f 2Function and whole coupling variable u, w is characterized in that as follows:
A3.1.1) f 1Mapping: f 1(c, x)=cx (1-x).C is the parameter of mapping, at A2.3) in determine by information.
A3.1.2) f 2Mapping: f 2(c, k, x)=c (x+k).C is the parameter of mapping, at A2.3) in determine by information.K is a constant.
A3.1.3) variable u is constructed by following formula:
u 1 = &Sigma; i = 1 N f 2 ( b i , k i , x i ) ,
u 2=u 1×2 48?mod?2 32
u 3=ff(u 2),
u = u 3 2 32 ,
A3.1.4) variable w is constructed by following formula:
w 1 = &Sigma; i = 1 N f 1 ( a i , x i ) ,
w 2=w 1×2 48?mod?2 32
w 3=ff(w 2),
w = w 3 2 32 .
8. initial chaining value (ICV) according to claim 3 is characterized in that, described initial chaining value (ICV) is respectively:
B2.1) coupling lattice point number N=4, four initial value value H 1=91ED38AA, H 2=BC4AC89D, H 3=D8A01D1A, H 4=EE4B30CB.
B2.2) coupling lattice point number N=6, six initial value value H 1=8018B519, H 2=A6C50F56, H 3=C0EDC832, H 4=D514141C, H 5=E59AD573, H 6=F3ADFDEE.
B2.3) coupling lattice point number N=8, eight initial value value H 1=6ADA291D, H 2=8CB280AB, H 3=A3EFC179, H 4=B6030647, H 5=C4F176FB, H 6=D1BB3843, H 7=DCF3E6BF, H 8=E6F91BB7.
B2.4) coupling lattice point number N=12,12 initial value value H 1=63C1258E, H 2=83DF84C4, H 3=9A0BEFB1, H 4=AB5AC599, H 5=B9B0AE14, H 6=C5FE6CFD, H 7=D0CF18EC, H 8=DA7B1242.H 9=E33E5756,H 10=EB43ABBF,H 11=F2AAB63B,H 12=F98B9A28。
B2.5) coupling lattice point number N=16,16 initial value value H 1=592B1196, H 2=76992425, H 3=8B16AC27, H 4=9B2C65DA, H 5=A88D7C2D, H 6=B4131777, H 7=BE3B2292, H 8=C755E0A4.H 9=CF99F4BD,H 10=D72E69A4,H 11=DE303559,H 12=E4B57966,H 13=EACF8964,H 14=F08C3CA7,H 15=F5F6D254,H 16=FB18903E。
9. f according to claim 7 2Function is characterized in that, described constant value is respectively:
B3.1) coupling lattice point number N=4, four constant value k 1=0.9801, k 2=0.9211, k 3=0.8253, k 4=0.6967.
B3.2) coupling lattice point number N=6, six constant value k 1=0.9898, k 2=0.9595, k 3=0.9096, k 4=0.8411, k 5=0.7556, k 6=0.6546.
B3.3) coupling lattice point number N=8, eight constant value k 1=0.9959, k 2=0.9835, k 3=0.9630, k 4=0.9346, k 5=0.8985, k 6=0.8549, k 7=0.8043, k 8=0.7470.
B3.4) coupling lattice point number N=12,12 constant value k 1=0.9970, k 2=0.9882, k 3=0.9735, k 4=0.9530, k 5=0.9269, k 6=0.8954, k 7=0.8585, k 8=0.8166, k 9=0.7698, k 10=0.7184, k 11=0.6629, k 12=0.6034.
B3.5) coupling lattice point number N=16,16 constant value k 1=0.9983, k 2=0.9931, k 3=0.9845, k 4=0.9724, k 5=0.9571, k 6=0.9384, k 7=0.9164, k 8=0.8913, k 9=0.8631, k 10=0.8319, k 11=0.7979, k 12=0.7610, k 13=0.7216, k 14=0.6796, k 15=0.6353, k 16=0.5888.
CNA2008102258686A 2008-11-04 2008-11-04 Hash function method with single-wheel time anti-collision Pending CN101414904A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008102258686A CN101414904A (en) 2008-11-04 2008-11-04 Hash function method with single-wheel time anti-collision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008102258686A CN101414904A (en) 2008-11-04 2008-11-04 Hash function method with single-wheel time anti-collision

Publications (1)

Publication Number Publication Date
CN101414904A true CN101414904A (en) 2009-04-22

Family

ID=40595237

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008102258686A Pending CN101414904A (en) 2008-11-04 2008-11-04 Hash function method with single-wheel time anti-collision

Country Status (1)

Country Link
CN (1) CN101414904A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580849A (en) * 2013-10-25 2014-02-12 西安理工大学 Spatiotemporal chaos secret communication method
CN110348246A (en) * 2018-04-08 2019-10-18 腾讯科技(深圳)有限公司 A kind of generation method of verification information, device, terminal device and medium
CN114244817A (en) * 2021-11-30 2022-03-25 慧之安信息技术股份有限公司 Hash collision processing method and device based on osi protocol stack header field
CN115765975A (en) * 2023-01-09 2023-03-07 苏州浪潮智能科技有限公司 Low-power-consumption realization method of SHA-256 algorithm, chip, server and storage medium
WO2023155644A1 (en) * 2022-02-21 2023-08-24 中兴通讯股份有限公司 Data processing method, forwarding chip, storage medium and program product

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580849A (en) * 2013-10-25 2014-02-12 西安理工大学 Spatiotemporal chaos secret communication method
CN110348246A (en) * 2018-04-08 2019-10-18 腾讯科技(深圳)有限公司 A kind of generation method of verification information, device, terminal device and medium
CN110348246B (en) * 2018-04-08 2022-08-30 腾讯科技(深圳)有限公司 Verification information generation method, device, terminal equipment and medium
CN114244817A (en) * 2021-11-30 2022-03-25 慧之安信息技术股份有限公司 Hash collision processing method and device based on osi protocol stack header field
WO2023155644A1 (en) * 2022-02-21 2023-08-24 中兴通讯股份有限公司 Data processing method, forwarding chip, storage medium and program product
CN115765975A (en) * 2023-01-09 2023-03-07 苏州浪潮智能科技有限公司 Low-power-consumption realization method of SHA-256 algorithm, chip, server and storage medium
CN115765975B (en) * 2023-01-09 2023-04-07 苏州浪潮智能科技有限公司 Low-power-consumption realization method of SHA-256 algorithm, chip, server and storage medium

Similar Documents

Publication Publication Date Title
CN101976322B (en) Safety metadata management method based on integrality checking
Teh et al. Parallel chaotic hash function based on the shuffle-exchange network
CN101237320B (en) Method for password protection for constructing unidirectional hash function based on infinite dimension ultra-chaos
CN101414904A (en) Hash function method with single-wheel time anti-collision
JP6120961B2 (en) Generation and verification of alternative data with a specific format
Tiwari et al. A secure and efficient cryptographic hash function based on NewFORK-256
CN102082668A (en) Message integrity authentication method based on coupling chaotic mapping
CN110995415A (en) Encryption algorithm based on MD5 algorithm
Sakan et al. DEVELOPMENT AND ANALYSIS OF THE NEW HASHING ALGORITHM BASED ON BLOCK CIPHER.
CN101399667A (en) Step function device and message spreading method for generating fast safe Hash function
Tiwari Cryptography in blockchain
WO2011050624A1 (en) Data conversion method and apparatus
CN102542070B (en) Method for structuring one-way Hash function based on random function
CN109547194B (en) Lattice-based chameleon hash function construction method
CN1885769B (en) Digital abstract forming device and method, and CA signing system and method
Liu et al. A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System.
CN103490876A (en) Data encryption method for constructing Hash function based on hyper-chaotic Lorenz system
CN106301764B (en) Message summarization method and system based on path hashing
Endignoux Design and implementation of a post-quantum hash-based cryptographic signature scheme
CN102546159B (en) Random one-way hash function construction method capable of preventing table check-up attack
Wang et al. The design and realization of the single-block hash function for the short message
Sagar Cryptographic Hashing Functions-MD5
CN105281911B (en) By the hash function method of random length character string maps to fixed size matrix
Mohanty et al. A secured cryptographic hashing algorithm
Libed et al. Enhancing MD5 Collision Susceptibility

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20090422