欢迎访问中国科学院大学学报,今天是

中国科学院大学学报 ›› 2009, Vol. 26 ›› Issue (5): 577-586.DOI: 10.7523/j.issn.2095-6134.2009.5.001

• 综述 •    下一篇

SHA-3杂凑密码候选算法简评

薛宇, 吴文玲, 王张宜   

  1. 中国科学院软件研究所信息安全国家重点实验室,北京 100190; 中国科学院研究生院信息安全国家重点实验室,北京 100049
  • 收稿日期:2009-04-08 修回日期:2009-05-13 发布日期:2009-09-15
  • 通讯作者: 薛宇
  • 基金资助:

    国家自然科学基金项目(60873259)和863项目(2007AA01Z470)资助 

Survey on the candidate algorithms of SHA-3 Hash function family

XUE Yu, WU Wen-Ling, WANG Zhang-Yi   

  1. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190,China; State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100049, China
  • Received:2009-04-08 Revised:2009-05-13 Published:2009-09-15
  • Supported by:

    国家自然科学基金项目(60873259)和863项目(2007AA01Z470)资助 

摘要:

为制订新的密码Hash算法标准SHA-3,NIST面向全世界发起了征集活动,目前对51个第一轮候选算法的分析评估工作已经在世界范围内火热展开.这些算法是Hash函数领域最新设计思想的集体展示,也会和AES一样成为密码学发展的一个里程碑.为了让更多的中国读者了解这些新的Hash算法并参与评估,简要介绍了目前安全的候选算法,并对51个候选算法的结构进行分类,对安全性和性能设计进行归纳总结和概要评估.

关键词: Hash函数, 碰撞, 有效实现, 结构, 差分

Abstract:

In order to develop the new Secure Hash Standard(SHA-3), NIST has announced request for candidate algorithms. Now the 51 first-round candidates are under evaluation worldwide. These algorithms represent the newest design ideas of cryptographic hash function, and SHA-3 will be another milestone like AES. In order to make domestic researchers know these new algorithms and join the work of evaluation, we briefly introduce these secure algorithms and classify them according to the structure. Meanwhile we sum up the design of security and efficiency on these algorithms.

Key words: Hash function, collision, efficient implementation, structure, differential

中图分类号: