首页> 外文期刊>Journal of Discrete Mathematical Sciences and Cryptography >Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications
【24h】

Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications

机译:安全云应用中的SHA-2系列构建块函数的实现与比较

获取原文
获取原文并翻译 | 示例
       

摘要

A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in security applications for authentication and data validation like message authentication, digital signature and fingerprinting. It can also be used in detecting duplicate data and uniquely identifying files. In this paper we analyzed the role of some of the building blocks of SHA-2 family .We have demonstrated that the disturbancecorrection strategy is applicable to the SHA-512 architecture and proved that functions S, ? are vital for the security of SHA-512, without them it is possible to find collisions with complexity 264 hash operations. We also demonstrated the functioning of 256- bit which was previously designed for 32 bit architecture but in this paper it is implemented using 64- bit architecture.
机译:安全散列算法基于消息摘要算法的原理,该算法用于算法的设计,如MD4和MD5等算法。 此算法的主要应用是它可以用于安全应用程序以进行身份验证和数据验证,如消息身份验证,数字签名和指纹。 它也可以用于检测重复数据和唯一标识文件。 在本文中,我们分析了SHA-2家族的一些构建块的作用。我们已经证明了干扰战略适用于SHA-512架构,并证明了该功能S,? 对于SHA-512的安全性至关重要,没有它们,可以找到与复杂性264哈希操作的碰撞。 我们还展示了256位的功能,先前设计用于32位架构,但本文使用64位架构实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号