Dissertation > Excellent graduate degree dissertation topics show

Analysis and Design of Hash Function

Author: LiRuiLin
Tutor: LiChao
School: National University of Defense Science and Technology
Course: Mathematics
Keywords: Hash functions Differential propagation Linear approximation herding attack Block cipher The MD4-x series Hash function
CLC: TN918.1
Type: Master's thesis
Year: 2007
Downloads: 168
Quote: 2
Read: Download Dissertation


Hash function has a very broad and important applications in the field of information security . The the MD4-x series classic Hash function has been hit hard in 2004 , the password academia ushered in the analysis and design craze Hash function . A commonly used method is designed based on a different group of mixed computing dedicated Hash function components . In this paper, the cryptographic properties of hybrid computing First, according to the the run distribution characteristics of the input differential differential propagation properties of hybrid computing , based on the iterative construction method ; followed by rational formal power series based on the free monoid theory of mixed computing the linear approximation nature ; several applications concludes with a discussion of the nature and the linear approximation of the differential propagation of hybrid computing nature . The Hash functions attacks attack iterative structure and dedicated Hash function the MD4-x series attacks . This article discusses the the iterative structure Herding Attacks , the iterative structure reverse order Herding attack . The study found that : the compression function satisfies certain backward predictive in nature , in reverse order Herding attack is more effective than the Herding attack , we give some Hash function in reverse Herding attack instances . Select dedicated Hash function round constant and the FSE 2006 compression function replacement components selected to make the analysis . The design principle of the block cipher are increasingly being used in the designs of the Hash function . Rijndael block cipher based framework design a new Hash function - RDH algorithm is based on mixed computing and cycle shift on different groups , to ensure full of confusion and diffusion of the news chain variable given the design principles of the algorithm and security analysis .

Related Dissertations

  1. Research on the Security Protocol of Air Interface for RFID System,TP391.44
  2. Study on Hash Function Construction Based on Message Network,N941.7
  3. The Algorithm’s Security Research of the Cryptography,TN918.1
  4. Provable Security for Feistel Ciphers Containing SPN Structure,TN918.1
  5. The Application and Research of Spatiotemporal Chaos Theory in Identity Authentication,TP393.08
  6. Hash function based on network coding and a secure communication scheme,TN918
  7. Packet classification algorithm based on the the NDIS intermediate Windows platform under,TP393.08
  8. Cryptography Hash function family,TN918.1
  9. Research on Load Balancing Based on Query Hotspot in Structured Peer-To-Peer Networks,TP393.02
  10. Ad hoc network based on energy-saving routing protocol security,TN929.5
  11. Research and Design of the RFID Authentication Protocol Based on Anti-collision,TP391.44
  12. Research and Design of RFID security authentication protocol based on Hash function,TP391.44
  13. Enterprise resource search system based on full-text search,TP391.3
  14. Cellular automata - based voice security technology research,TN912.3
  15. Safety analysis of the threshold group signature scheme,TN918.1
  16. The Simulation and Comparison of Bloom Filter and Its Improved Algorithms in the Distributed Environment,TP393.02
  17. Cryptanalysis of Blue Midnight Wish Algorithm of the Second Round Candidates of the SHA-3,TN918.1
  18. Research and Design of RFID Security Authentication Protocol,TP391.44
  19. Application Research of Elliptic Curves in Key Management of WSN,TN918.82
  20. Cryptanalysis of the Reduced HASH Functions SHA-256 and SHA-512,TN918.1
  21. The Research and Application on Message Data Integrity Authentication Based on Block Cipher,TN918.91

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile