期刊文献+

基于哈希算法的动态口令令牌分析与应用 被引量:2

Dynamic Password Token Hash Algorithm Based on Analysis and Application
下载PDF
导出
摘要 当今世界处于经济全球化的大环境之下,科学技术及信息化实现快速发展,计算机技术及应用逐渐与人们的生产生活紧密相连,越来越大的信息量被人们存储到计算机当中,并运用互联网将信息输送到指定地点,或实现资源共享。巨大的信息量使人们逐渐意识到网络安全的重要性。随之哈希算法的动态口令令牌出现逐渐解决了一直困扰着人们的难题。这种动态口令令牌兼安全性、高效性及便捷性等优点于一身。随着人们对其认识的不断深入,这种动态口令更被广泛应用于各种场合,并且在保证人们信息安全性的问题上扮演着越来越重要的角色。因而,笔者在总结前人研究问题的基础之上,着重对现今社会中最具安全性的哈希算法的动态口令令牌进行深入的研究。 In today's world under the environment of economic globalization, and informatization rapid development of science and technology, computer technology and application is closely combined with the production and living of people gradually, more and more information has been stored in the computer, and using the Internet to transfer information to the designated place, realize resources sharing. Huge amount of information in today's society to make people gradually realized the importance of network security. Then the hash algorithm of dynamic password token appears gradually solved the difficult problem has been bothering people. The dynamic password token and the advantages of safety, high efficiency and convenience. With the deepening of the understanding of the people, the dynamic password is widely applied to various occasions, and in order to safeguard the safety of people data information plays a more and more important role on the issue. Therefore, the author on the basis of summarizing the predecessors' research question, focus on the most safety in the modern society of the hash algorithm of dynamic password token in-depth study.
作者 汪刚
出处 《软件》 2014年第3期101-102,共2页 Software
关键词 哈希算法 动态口令令牌 分析与应用 hash algorithm The dynamic password token Analysis and application
  • 相关文献

参考文献5

二级参考文献16

  • 1Bruce Schneier.Apply cryptology[M].北京:机械工业出版社,2000.311-315.
  • 2RIVEST R. The MD5 message-digest algorithm, RFC 1321[ S]. Internet Activities Board, Intemet Privacy Task Force, 1992.
  • 3den BOER B , BOSSELAERS A . Collisions for the compression function of MD5[ C]// Advances in Cryptology - EUROCRYPT'93, LNCS 765. Heidelberg: Springer-Verlag, 1994:293-304.
  • 4DOBBERTINH. CryptanalysisofMD5 compress[ EB/OL]. [ 2008 -09 -20]. http://citeseer, ist. psu. edu/dobbertin96cryptanalysis, html.
  • 5WANG XIAO-YUN, FENG DENG-GUO, LAI XUE-JIA, et al. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD[ EB/OL]. [ 2008 - 09 - 20]. http://eprint, iacr. org/ 2004/199. pdf.
  • 6WANG XIAO-YUN, YU HONG-BO. How to break MD5 and other hash functions[ C]//Advances in Cryptology - EUROCRYPT 2005, LNCS 3494. Heidelberg: Spfinger-Verlag, 2005:19-35.
  • 7HAWKES P, PADDON M, ROSE G. Musings on the Wang et al. MD5 collision[ EB/OL]. [ 2008 - 09 - 12]. http://eprint, iacr. org/2004/264, pdf.
  • 8KLIMA V. Finding MD5 collisions on a notebook PC using multimessage modifications[ EB/OL]. [2008 -09 - 10]. http://eprint. iacr. org/2005/102, pdf.
  • 9SASAKI Y, NAITO Y, KUNIHIRO N, et al. Improved collision attack on MD5[ EB/OL]. [2005 -09 - 10]. http://eprint, iacr. org/ 2005/400. pdf.
  • 10SASAKI Y, NAITO Y, YAJIMA J, et al. How to construct sufficient condition in searching collisions of MD5[ EB/OL]. [ 2008 -09 - 10]. http://epfint, iacr. org/2006/74, pdf.

共引文献52

同被引文献15

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部