Cryptanalysis of some chaos-based keyed hash functions
|更新时间:2024-10-14
|
Cryptanalysis of some chaos-based keyed hash functions
Vol. 32, Issue 5, Pages: 146-152(2011)
作者机构:
1. 北京邮电大学网络与信息攻防技术教育部重点实验室
2. 山东大学计算机学院
3. 北京邮电大学网络与交换技术国家重点实验室信息安全中心
作者简介:
基金信息:
DOI:
CLC:TN918.1
Published:2011
稿件说明:
移动端阅览
ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, et al. Cryptanalysis of some chaos-based keyed hash functions[J]. 2011, 32(5): 146-152.
DOI:
ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, et al. Cryptanalysis of some chaos-based keyed hash functions[J]. 2011, 32(5): 146-152.DOI:
Cryptanalysis of some chaos-based keyed hash functions
摘要
利用统计分析、生日攻击等方法
针对一类基于混沌系统的带密钥散列函数进行了分析
给出了针对这些算法的伪造攻击和等价密钥恢复攻击。同时
研究了上述攻击奏效的原因
并由此总结了基于混沌技术设计带密钥散列函数时应该注意的问题。最后
提出了一个改进方案
该方案可以抵抗伪造攻击和等价密钥攻击
并且增加的计算负担可以忽略不计。
Abstract
By employing the methods including statistic analysis
birthday attacks
and so on
the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile
the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally
an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks