期刊文献+

基于组合随机性特征的哈希函数识别方案 被引量:2

Hash Function Recognition Scheme Based on Combinatorial Randomness Feature
原文传递
导出
摘要 加密算法的识别对于密码分析研究有着重要的意义,目前学者们已经在此领域展开了一些研究并取得了一定的进展。然而在针对哈希函数的识别方面,所展开的理论研究较少。本文对随机性检测特征进一步挖掘,利用欧氏距离筛选出对哈希函数最有区分度的3个检测项,基于选出的检测项的核心关注点重新构建特征生成方法,并结合随机森林模型,提出了一种基于组合随机性特征的哈希函数识别方案。通过实验分析,该识别方案明显优于传统的基于随机性检测特征的识别方案。 The recognition of encryption algorithms is of great significance to the research of cryptographic analysis.At present,scholars have carried out some research and made some progress in this field.However,there are few theoretical studies on Hash function recognition.In this paper,the randomness detection features are further mined.The Euclidean distance is used to screen out the three detection items that have the most distinguishing degree to the Hash function.Based on the core concerns of the selected detection items,the feature generation method is reconstructed.Combined with the random forest model,a Hash function recognition scheme based on the combined randomness features is proposed.Through experimental analysis,the recognition scheme is obviously superior to the traditional recognition scheme based on random detection features.
作者 王徐来 向广利 李蓓蕾 李祯鹏 张涛 WANG Xulai;XIANG Guangli;LI Beilei;LI Zhenpeng;ZHANG Tao(School of Computer Science and Artificial Intelligence,Wuhan University of Technology,Wuhan 430070,Hubei,China;China Construction Third Engineering Bureau Installation Engineering Co.,Ltd.(Intelligent Business Department of China Construction Third Engineering Bureau),Wuhan 430060,Hubei,China)
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2023年第2期215-222,共8页 Journal of Wuhan University:Natural Science Edition
基金 湖北省重点新产品计划(2021BAA030)
关键词 密码分析 哈希函数 特征提取 随机性检测 cryptanalysis Hash function feature extraction randomness test
作者简介 王徐来,男,硕士生,现从事信息安全研究。E-mail:409852467@qq.com;通信联系人:向广利,E-mail:glxiang@whut.edu.cn
  • 相关文献

参考文献5

二级参考文献19

  • 1Ronald Rivest. The MD5 message digest algorithm.RFC1321, April 1999,http://rfc.net/rfc1321.html.
  • 2Ronald Rivest. The MD4 message digest algorithm.RFC1320, April 1992, http://rfc.net/rfc1320.html.
  • 3B den Boer, A. Bosselaers. Collisions for the compression function of MD5. In Proc. Advances in Cvyptology, EUROCRYPT'93, LNCS 765, Helleseth T (ed.), Springer-Verlag,Berlin, Germany, 1994, pp.293-304.
  • 4Dobbertin H, Cryptanalysis of MD5 compress. Rump session of Eurocrypt'96, http://www.cs.ucsd.edu/users/bsy/dobbertin.ps, 1996.
  • 5Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Rump session of Crypto'04, Cryptology ePrint Archive, Report2004/199, http://eprint.iacr.org/2004/199.pdf, 2004.
  • 6Xiaoyun Wang, Hongbo Yu. How to break MD5 and other hash functions. In Proc. Advances in Crytolog-EUROCRYPT 2005, LNCS3494, Cramer R (ed.), Springer-Verlag, pp.19-35.
  • 7Vlastimil Klima. Finding MD5 collisions on a notebook PC using multi-message modifications. In Proc. International Scientific Conference Security and Protection ofInformation 2005, Brno, Czech Republic, May 3-5, 2005,http://eprint.iacr.org/2005/102.pdf.
  • 8Patrick Stach. MD5 Collision Generator. (pstach@stachliu.com), http://www.stachliu.com, nyud.net:8090/md5collc.
  • 9Vlastimil Klima. Finding MD5 collisions--A toy for a notebook. Cryptology ePrint Archive, Report2005/075, March,2005, http://eprint.iacr.org/2005/075.pdf.
  • 10Zhang-Yi Wang, Huan-Guo Zhang, Zhong-Ping Qin, Qing-Shu Meng. A fast attack on the MD5 hash function. Journal of Shanghai Jiaotong University, 2006, 11(2): 140-145, 151.

共引文献42

同被引文献27

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部