降低 Hash 函数复杂度---以 MD5和 SHA-1为例(IJMSC-V5-N1-1)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.MathematicalSciencesandComputing,2019,1,1-17PublishedOnlineJanuary2019inMECS()DOI:10.5815/ijmsc.2019.01.01Availableonlineat:MD5andSHA-1asExamplesDr.YousefAliAl-Hammadi1,MohamedFadlIdrisFadl21UnitedArabEmiratesUniversity,UAE2IslamicUniversity,SudanReceived:21April2018;Accepted:09August2018;Published:08January2019AbstractHashfunctionsalgorithmsalsocalledmessagedigestalgorithms,compressamessageinputofanarbitrarylength,andproduceanoutputwithafixedlengththatisdistributedrandomly.SeveralhashalgorithmsexistsuchasMd5andSHA1.Thesealgorithmsverifydataintegrityandrestrictunauthorizeddatamodification.However,theyexperiencesomecomplexities,especiallywhenimplementedinbitcoinmining,andlowcomputationdevices,inparticularlyIoTdevices.Asaremedy,thispapersuggestsanewcompressionfunctionthatreducesthecomplexityofthehashfunctionalgorithmssuchasMD5andSHA-1.Also,provesthatwecanobtainthesameresultswhichareachievedbytheoriginalcompressionfunction.IndexTerms:Hashfunctionscomplexity,SHA1,MD5,Bitcoinmining,Energyconsumptioninbitcoinmining.©2019PublishedbyMECSPublisher.Selectionand/orpeerreviewunderresponsibilityoftheResearchAssociationofModernEducationandComputerScience1.IntroductionAsaforementioned,Hashalgorithmscompressamessageinputofanarbitrarylengthandproduceanoutputwithafixedlengththatisdistributedrandomly.Thehashfunctionmusthavethefollowingproperties:first,thehashvaluemustbeeasytocompute.Second,itishardtocalculatethemessagefromthegivenhashvalue(thefunctionisone-wayfunctiononly)and,third,itisalsohardtofindtwodifferentmessageswiththesamehashvalueoutput[1].Ingeneralterms,wecanusehashfunctioninvarioussecurityapplicationsincludeMessageAuthentication,DigitalSignatures,IntrusionDetection,VirusDetection,Pseudo-randomNumberGeneratorandPassword*Correspondingauthor.E-mailaddress:yousef-A@uaeu.ac.ae,m.fadl@outlook.com2ReducingHashFunctionComplexity:MD5andSHA-1asExamplesverification,buttheprimaryusageofthehashfunctionsistoverifydataintegrityandrestrictunauthorizeddatamodification.Inthispaper,weareinterestedinasingleblockofahashfunctionsuchaspasswordverification.2.PasswordVerificationPasswordverificationisinventedbyRogerNeedham,whostatedthatinsteadofsavingallpasswordsasaplain-textformat,wecouldsavethehashdigestofthepasswordonly.Intherecentpastyears,mostofthesecureonlinebusinessisbasedontheusername/passwordauthenticationscheme.Thisschemeusesthestaticpasswordidentificationthathasavulnerabilitywhichenablespeopletorevealthepasswordeasily.Alternatively,theresearchersproposedtousesingleblockhashfunctionsasanauthenticationscheme.Inthisscheme,thesystemsavestheuserpasswordasahashvalueformat.Thepasswordisoftenconcatenatedwitharandom,non-secretsaltvaluebeforethehashfunctionisapplied.Thenthesystemcanauthenticatetheuserbycomparingtheenteredhashedpasswordwiththestoredone.Therefore,ifthesystemverifiestheusersuccessfully,then,hecanaccessthesystem.Otherwise,thesystemrejectstheuser.Incasetheuserforgetshispassword,then,thesystemcanallowhimtoreplacethepasswordwithanewone.Thesingleblockofhashfunctionlengthis512bitsifweremovethepaddingandthemessagesize,theremaininglengthis440bits(55characters),whichisproperforpasswordbecauseinmostcasesthepasswordlengthcannotexceedthe55characters.3.RelatedWorkTheresearchershaveexaminedthehashfunctionsalgorithmstoreducethecomplexityofthesealgorithms.[2]ProposedanarchitectureleveloptimizationtechniqueforuniversalHashFunctionsbyusingDivide-and-Concatenateapproach.Theyfoundthatthedivide-and-concatenatetechniquecannotspeed-upsoftwareimplementationsbutcanonlyimprovetheresistanceofcollision.[3]HavepresentedapipelinedserializedarchitecturefortheSHA-3candidateKeccak,whichoffersverylowareaandpowerconsumptionwithacceptablethroughput.TheirarchitectureisespeciallyattractiveforlightweightapplicationswhenimplementedwithcompactversionsofKeccak[4]Havedescribedanewfamilyofuniversalhashfunctionsgearedtowardshigh-speedmessageauthentication.Theyalsointroducedadditionaltechniquesforspeedinguptheirconstructionsbyignoringcertainpartsofthecomputation,whilestillretainingthenecessarystatisticalpropertiesforsecuremessageauthentication.[7]Theauthorshaveproposedalightweighthashfunctionwithreducedcomplexityintermsofhardwareimplementation,capableofachievingstandardsecurity.Itusesspongeconstructionwithpermutationfunctioninvolvingtheupdateoftwonon-linearfeedbackshiftregisters.Thus,intermsofspongecapacityitprovidesatleast80bitsecurityagainstgenericattackswhichisacceptablecurrently.[8]haveestablishedtheexistenceoflow-complexitycryptographichashfunctionsthatcompresstheinputby(atleast)aconstantfactor.TheyconstructCRHwithlinearcircuitsize,constantlocality,oralgebraicdegree3overZ2underdifferentflavorsofthenewlyintroducedbinarySVP(bSVP)assumption.[9]Theauthorshaveproposedalightweighthashfunctionwithreducedcomplexityintermsofhardwareimplementation,capableofachievingstandardsecurity.Itusesspongeconstructionwithpermutationfunctioninvolvingtheupdateoftwonon-linearfeedbackshiftregisters.Thu

1 / 17
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功