Font Size: a A A

BMW And SM3 HASH Function Analysis Algorithms

Posted on:2015-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:S MengFull Text:PDF
GTID:2268330425495908Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Hash function in modern cryptography have a very important position, It can becompressed into a message of arbitrary length hash value of fixed length. Since hash functionwith good collision resistance, and easy to calculate, It is widely used in informationauthentication and data integrity testing and other aspects. Due to the wide application of hashfunction, so the design and analysis of hash function cryptography has been hot.In recent years, Since Professor Wang use breakthrough technology and bit expresslymodified tracing the attack made on the hash function. Current safety standards such hashfunction to no longer meet the practical requirements. So NIST launched a new standard in2007of solicitation SHA-3contest. BMW candidate algorithms for entry into the secondround.China promulgated the SM3algorithm in2010, The algorithm is designed by ourProfessor Wang.In this paper, the use of differential analysis method to attack the BMW algorithms,Mainly related to the algorithm analysis, the algorithm constructs BMW differential path andgive a collision course. For each step in the process of collision and gives a detailed analysisof the final results, and ultimately find a collision right.BMW algorithm as SHA-3second round candidates fat count, has as good security. Inthis paper, base on the analysis of the process of the BMW algorithm, the main advantage ofF0, F1, F2three parts Boolean functions inside and spread differential offset. By setting areasonable difference as far as possible so that the final output to produce more collisions bit.By analyzing the differential path at different security parameters, the final output of the lowerfive produce collisions.In addition to the SM3algorithrm was introduced, including SM3algorithm constants,Boolean functions, message development and fill and concrete compression process. Theattack methods of existing SM3algorithms are studied.BMW and SM3algorithms are relatively new algorithm in recent years enacted, bothhave a high level of security. The security analysis of the two algorithms is relatively small.Therefore, the research results of this paper has a certain significance to BMW algorithm andSM3algorithm.
Keywords/Search Tags:Block cipher, BMW cryptographic algorithms, SM3cryptographic algorithms, differential analysis, collision attack
PDF Full Text Request
Related items