期刊文献+

LTE系统密钥生成算法研究 被引量:1

Research on the Key Derivation Algorithm in LTE System
下载PDF
导出
摘要 介绍了单向散列函数特性和SHA-256算法原理。基于C语言实现SHA-256算法的程序设计,在Visual C++6.0环境下仿真测试结果,对该算法的单向散列函数特性进行了分析。对24组1 024 bit测试数据测试分析,结果表明,SHA-256算法具有理想的单向散列函数特性。 The properties of One-way hash function and the principle of the algorithm SHA-256 are introduced. The program design is realized based on C language, the One-way hash function properties of SHA-256 is analyzed through the simulation of the test result in Visual C++ 6.0. 24 groups of 1 024 bit data is tested and analyzed, the result shows that SHA-256 inherits desirable One-way hash function properties.
作者 倪伟 董宏成
出处 《电视技术》 北大核心 2011年第1期93-96,共4页 Video Engineering
基金 国家科技重大专项(2009ZX03002-009)
关键词 单向散列函数 SHA-256 抗冲突性 均匀分布性 One-way Hash Function SHA-256 collision resistance uniform distribution
  • 相关文献

参考文献1

二级参考文献10

  • 1WANG Xiaoyun, FENG Denggou, LAI Xuejia, YU Hongbo.Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD [C]//Rump Session of Crypto' 04 and IACR ePrint Archive, August 2004.
  • 2WANG Xiaoyun, YU Hongbo. How to break MD5 and other Hash functions [ C]//Advances in Cryptology - Eurocrypt'05, Lecture Notes in Computer Science, 2005, 3494 : 19 - 35.
  • 3WANG Xiaoyun, YU Hongbo. Efficient collision search attacks on SHA-0 [ C ]//Advances in Cryptology-Crypto' 05, Lecture Notes in Computer Science, 2005,3621 : 1 - 16.
  • 4WANG Xiaoyun. Finding collisions in the full SHA-1 [ C ]//Advances in Cryptology-Crypto05, Lecture Notes in Computer Science, 2005,3621:17 -36.
  • 5Nalional Institute of Standards and Technology. Secure Hash Standard (SHS)[ S]. Federal Information Processing Standards (FIPS) Publication, 2004, 180-2.
  • 6MATUSIEEICZ K, PIEPRZYK J, PRAMSTALLER N, RECHBERGER C, RIJMEN V. Analysis of simplied variants of SHA-256 [ C ]//In WEWoRC 2005 Western European Workshop in Cryptology, 2005 : 123 - 134.
  • 7YOSHIDA H, BIRYUKOV A. Analysis of a SHA-256 variant [C]//Selected Areas in Cryptography (SAC 2005 ), Kingston, Ontario, 2005:245 - 260.
  • 8GILBERT H, HANDSCHUH H. Security analysis of SHA-256 and sisters [C]//Selected Areas in Cryptography' 03, Lecture Notes in Computer Science, 2003, 3006:175 - 193.
  • 9CHABAUD F, Joux A. Differential collisions in SHA-0 [ C ]//Advances in Crypyology-CRYPYO ' 98, Lecture Notes in Computer Science, 1998,1462 : 56 - 71.
  • 10HAWKES P, PADDON M, ROSE G G. On corrective patterns for the SHA-2 family [EB/OL]. Cryptology ePrint Archive, August, 2004/207 [ 2006-10-01 ]. http:// eprint. iacr. org,/2004/207.

共引文献2

同被引文献3

  • 1王映民.TD-LTE技术原理与系统设计[M].北京:人民邮电出版社,2011.
  • 23GPP TS 33.102 V9.4.0,3rd Generation Partnership Project;Techni-calSpecification Group Servicesand System Aspects;3G Security;Securityarchitecture(Release9)[S]],2010.12.
  • 3ELKAM CH OUCH IH M,NASR M E,ABCELFATAH R I,A new se-cure and fash hashing algorithm(SFH A-256)[C]//25th NationalRadioScienceConference.Tanta:[s.n.],2008.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部