ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, et al. Cryptanalysis of some chaos-based keyed hash functions[J]. 2011, 32(5): 146-152.DOI:
基于混沌的带密钥散列函数安全分析
摘要
利用统计分析、生日攻击等方法
针对一类基于混沌系统的带密钥散列函数进行了分析
给出了针对这些算法的伪造攻击和等价密钥恢复攻击。同时
研究了上述攻击奏效的原因
并由此总结了基于混沌技术设计带密钥散列函数时应该注意的问题。最后
提出了一个改进方案
该方案可以抵抗伪造攻击和等价密钥攻击
并且增加的计算负担可以忽略不计。
Abstract
By employing the methods including statistic analysis
birthday attacks
and so on
the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile
the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally
an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks