Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.
Citation:
Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.
Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.
Citation:
Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.
This paper constructs the Hash algorithm based on strong one-way permutation by the composition of one-way permutation and perfect permutation on n and proves that its security is equivalent to the one-way permutation that can not be inversed in polynomial time.
Pieprzyk J, Sadeghiyan B. Design of Hashing Algorithm. Berlin Heidelberg: Springer-Verlag, 1993: 132-169.[2]Webster A F.[J].Tavares S E. On The Design of S-Boxes. Advances in Cryptology-CRYPTO85, Santa Barbara: 1985, Berlin Heidelberg: Springer-Verlag.1986,:-[3]Preneel B, Govaerts R, Bandewalle J. Information Authentication: Hash Functions and Digital Signatures. Computer Security and Industrial Cryptology, State of the EAST curse, Leuven 1991, Berlin Heidelberg: Springer-Verlag, 1993: 88-130.X Lai; Massey J L. Hash Function Based on Block Ciphers. Advances in Cryptology-EUROCRYPT92. Balatonfured: 1992, Berlin Heidelberg: Springer-Verlag, 1993, 50-70.