您现在的位置: 首页> 研究主题> SHA-1

SHA-1

SHA-1的相关文献在2002年到2022年内共计202篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、数学 等领域,其中期刊论文95篇、会议论文3篇、专利文献104篇;相关期刊69种,包括信息工程大学学报、电子产品世界、信息安全与通信保密等; 相关会议3种,包括2006年全国信息、电子与控制技术学术会议(IECT'2006)、中国计算机用户协会网络应用分会2005网络新技术与应用研讨会、中国科学院计算技术研究所第八届计算机科学与技术研究生学术讨论会等;SHA-1的相关文献由424位作者贡献,包括G·M·沃尔里齐、K·S·雅普、V·戈帕尔等。

SHA-1—发文量

期刊论文>

论文:95 占比:47.03%

会议论文>

论文:3 占比:1.49%

专利文献>

论文:104 占比:51.49%

总计:202篇

SHA-1—发文趋势图

SHA-1

-研究学者

  • G·M·沃尔里齐
  • K·S·雅普
  • V·戈帕尔
  • J·D·吉尔福德
  • S·M·格尔雷
  • 严金平
  • 伊日布斯
  • E·奥兹图科
  • M·G·迪克森
  • W·K·费格哈利
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

    • 张铆; 洪泽; 蒋炯炜
    • 摘要: 基于SHA-1加密算法进行系统身份认证,通过USB2.0通信芯片FT2232H设计一种高效、安全的SOC Flash程序烧写系统.SOC程序烧写系统分为上位机和下位机,上位机利用FT2232H异步FIFO接口与SOC的TAP接口相连,TAP接口与下位机SOC的OCD模块相连,完成数据的相互传输.上位机利用SHA-1加密算法生成MAC值与下位机完成身份确认,调用其提供的动态链接库,实现SOC各种Flash程序的快速烧写,实验证明,基于SHA-1身份认证的Flash程序烧写系统能够实现高效、安全的程序烧写.
    • Amjed Sid Ahmed; Rosilah Hassan; Faizan Qamar; Mazhar Malik
    • 摘要: In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its performance.In this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.Fulfilling Hash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of CGA.Therefore,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious.
    • 冯永新; 王良; 钱博
    • 摘要: 随着无人机通信技术的发展,保证传输数据的完整性、可靠性愈发关键.鉴于Hash函数单向性与唯一性的特点,将其引入无人机下行链路通信系统中,进而提出了一种基于改进SHA-1的无人机下行链路安全通信方法,该方法通过对分组后无人机待传输数据的消息摘要进行计算,实现对分组数据的认证.仿真结果表明,该方法可以对无人机待传输数据进行有效认证,并且提高了认证系统的时效性.
    • 李丽平; 周清雷; 李斌
    • 摘要: 随着计算机技术的发展,微软的Office系列软件已经成为主流的文本编辑软件.找到一种高效的恢复被加密文档的口令的方案具有重要的意义.传统的基于CPU和GPU的破解方法破解速度慢,大大限制了破解的应用.为了提高口令的破解速度,本文提出了基于多核FPGA的设计思想.详细分析了解密Office文档涉及的核心算法SHA1和AES.在全流水线结构下,按照多核并行的设计思想,设计了基于多核FPGA的Office口令破解程序,实现Office口令的高速破解.实验结果表明:在单片四核FPGA上破解Office口令,其破解速度达138600H/s,是普通口令破解软件的62倍,是基于GPU的Hashcat口令破解软件的5倍.基于数据流的设计思想使得流水线上的所有数据块处于高效工作状态,同时多个数据流并行工作.大大提高了破解速度,实现了对Office文档加密密码的快速破解.
    • 易平; 庄毅
    • 摘要: 针对嵌入式系统的安全问题,在充分考虑嵌入式系统的设计约束条件的基础上,借鉴可信计算的思想,提出一种基于虚拟技术的嵌入式可信平台构建方案.该平台基于分层内核架构,采用龙芯国产化处理平台,由增加SHA-1引擎的可信引导程序及可信内核模块构建核心度量根,其中可信内核是一个内嵌vTPM(virtualized trusted platform module)的精简操作系统,并依据该信任根设计了信任链传递模型.为缩短信任链的长度,采用联合度量方式对引导加载程序及可信内核进行完整性校验,用户内核是经过设计裁剪的嵌入式操作系统,运行在虚拟机上,实现了基于国产处理器的嵌入式平台可信计算环境的建立.实验结果表明,该方案在启动过程中完成从信任根到操作系统的完整性校验,且在不添加额外硬件的基础上,使系统的安全性得到了很大提高.%Aiming at the security of embedded platform,based on the idea of trusted computing,fully considering the design constraints of embedded platform,we propose a method of constructing embedded trusted platform on account of virtual technology.It employs the do-mestic processor of LOONGSON based on the layered kernel architecture and establishes the core measure root by trusted bootloader that increases the SHA-1 engine and trusted kernel modules.Trusted kernel contains virtual trusted platform module(vTPM) which can pro-vide cryptographic functions.In order to shorten the length of the trusted chain,boot loader and trusted kernel together can be measured as a whole to guarantee the integrity.The embedded operating system is designed and tailored to be user kernel,running on the virtual ma-chine,and the establishment of embedded platform trusted computing environment based on domestic processor is realized.The experi-ments show that this method has built a trusted computing environment for embedded applications without additional hardware and im-proves the security of systems largely.
    • 王孟钊
    • 摘要: SHA1是一种常见散列算法,算法常用于数字签名.该算法和MD5类似,相较于MD5算法,它修改了MD5中的分组处理函数,分组字节序等部分,从而形成了SHA1算法.该算法安全性高,运行效率较高.该算法在目前互联网环境中应用十分广泛.SHA1发展了很多年,但是在2017年2月谷歌已经发现了对碰撞实例.不同的两个文件在经过SHA1算法计算后出现了同样的散列值.SHA1算法对加密串有一定的要求,它只能对数据比特长度少于2^64次方的数进行加密.输入串在经过该算法计算后,可获取160比特的散列值,文中将详细介绍SHA1算法的具体实现原理和实现步骤.
    • 刘西林; 严广乐
    • 摘要: 针对电子病历的保密性问题,提出一种混沌映射与GF(24)域乘法运算相结合的电子病历图像加密算法.通过对电子病历的灰度图像使用SHA-1算法产生的哈希值作为病历摘要来监测电子病历的传播.利用二维图像展成一维向量后的无重复置乱算法结合GF(24)域乘法运算的扩散算法对病历图像进行加密.Lorenz混沌映射产生相应的密码.实验结果表明:算法的安全性高,有效保证电子病历在传递过程中的安全性.
    • 王文功; 于松林; 李玉峰; 陈博
    • 摘要: SHA-1(Secure Hash Algorithm)是一种非常流行的安全散列算法,为了满足各种应用对SHA-1算法计算速度的需要,该文围绕Hash函数,基于本课题组的密文取情平台,对SHA-1算法进行深入研究,面向Xilinx K7410T FPGA芯片设计SHA-1算法实现结构,完成SHA-1算法编程,进行测试和后续应用.该算法在FPGA上实现,可以实现3.2 G bit/s的吞吐率,最大时钟频率为95 MHz.仿真结果表明,与其它硬件设计相比,该算法在不影响原算法的安全的基础上可以获得更高的运行速度和吞吐量.%SHA-1 algorithm is the most commonly used secure hash algorithms , in order to meet the needs of higher operation speed, This paper around the Hash function, based on the research platform for the cipher text take affection, to conduct the thorough research to the SHA - 1 algorithm, facing the Xilinx K7 SHA-1410 t the FPGA chip design algorithm structure for testing and subsequent applications. The algorithm on the FPGA implementation , it can implement the throughput of 3.2 G bit/s, maximum clock frequency of 95MHZ. The simulation results show that compared with other hardware design, the algorithm without affecting the safety of the original algorithm on the basis of higher speed and throughput can be obtained.
    • 冯浩; 吴绍民; 吕冰
    • 摘要: 利用SHA-1算法的扰动向量消息扩展准则,可以得到后60步扰动向量中各比特与初始16步扰动向量之间的两个特性.60步扰动向量汉明重小于35的必要条件是初始16步扰动向量中每个扰动向量的汉明重小于等于3;60步扰动向量汉明重小于35的另一个必要条件为初始16步扰动向量中活动比特差小于等于3.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号