Font Size: a A A

Hash Collsion Security Search Based On Quantum Computing Algorithms

Posted on:2013-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2248330362970906Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the cornerstone of digital signature, the Hash function is used for detecting whether thenetwork information has been tampered with, but more important, it’s also the key technology for theguarantee of electronic signature, authentication and other password system security. Currently,calculated by the classical mathematical method, Hash function security analysis could not beassessed against quantum computing attacks, so it’s very necessary to seek a new method for quantumcomputation analysis and make the research into the security of Hash function.With the continual development of the quantum information technology, the quantum computingtechnology has also been advanced step by step. The analysis based on the quantum algorithm ciphernot only extends the application scope and values of quantum computation and quantum algorithms,but also provides a better understanding for the quantum algorithm on some key problems for thepeople. What’s more, it is of real significance for the national security and information security relatedto the major commercial interests.This paper mainly makes a study of Hash quantum collision based on the Grover searchalgorithm and the quantum counting. In specific work, this paper points out that the existing Hashcollision quantum model does not consider the disadvantage of the unknown problems of the Hashcollision which can be solved by the introduction of quantum counting algorithm, and presents a newcollision model based on the original Grover algorithm. On this basis, according to the collisioncharacteristics of the search space and the solution density, we put forward an improved quantumsearching collision model and make a comparison between the one based on the original Groveralgorithm and the latter one. Meanwhile, on the basis of the existing quantum circuits, this article usesa bottom-up approach to layer the detailed design of the iterative algorithm and custom functionSHA-1and weak collision attack line of BLAKE algorithm Quantum, which can be used as theOracle circuit design of weak collision attack for Hash function quantum and the accordance of theintegrated design for quantum computer chip.
Keywords/Search Tags:quantum computing, hash functions, Grover’s quantum search algorithm, quantumcounting, Oracle, quantum circuit
PDF Full Text Request
Related items