Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Modified SHA-1 hash algorithm

A hash algorithm and addition technology, applied in the field of SHA-1 hash algorithm, can solve the problem of lack of calculation amount, and achieve the effect of improving efficiency and high security

Inactive Publication Date: 2010-10-27
HANGZHOU DIANZI UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the security of SHA-1 is constantly being challenged, the huge amount of calculation required to crack the algorithm is meaningless for the current hardware level.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Modified SHA-1 hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] A kind of improved SHA-1 hash algorithm, comprises the following steps:

[0066] Step (1) adds a 1 and several 0s (at least 1, up to 512) behind the message to be processed, so that the length of the message becomes 448 as a result of the remainder of 512;

[0067] Step (2) add a 64-bit binary string behind the newly obtained message, the value of the binary string is the original length of the message, and the length of the message is now a multiple of 512, and then the message is expanded and grouped so that the original 512-bit The packet becomes a 1024bit packet, that is, adjacent 512bit packets form a new 1024bit packet.

[0068] In the SHA-1 algorithm, the length is less than 2 64 The message is divided into multiple 512bit packets after being assembled, and one packet is processed each time. The algorithm first expands the original 512-bit words, that is, 16 32-bit words, to 80 32-bit words according to certain rules, to meet the needs of four loop modules in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a modified SHA-1 hash algorithm. The existing SHA-1 harsh algorithm has low security. The invention firstly adds a 1, a plurality of 0 and a 64-bit binary string after the information to be processed, then enlarges and groups the information, so the original 512-bit group is changed into a 1024-bit group and a register value is initialized; then a main cycle is utilized to sequentially process each group, the main cycle totally has four operations, and each operation contains logical function and compression function processing; and finally, after the processing of all the groups is completed, 160-bit message digest is output, and when the message digest is transferred, the message to be transferred is added with a safety hashed value. Through the algorithm of the invention, the original SHA-1 algorithm has more safety on message processing, and through modifying the logical function expression and the compression function logical structure of the algorithm, the efficiency of the SHA-1 algorithm is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an improved SHA-1 hash algorithm used in authentication protocols. Background technique [0002] Digital signature is an important information security technology, it is widely used in the field of network information exchange, and a special kind of mathematical algorithm is usually used in various digital signature technologies - hash algorithm, which is used in digital It occupies an extremely important position in signature technology. Currently common hash algorithms include MD5, SHA-1, and RIPEMD-160, and MD5 and SHA-1 tend to be used in China. At present, SHA-1 has become the most widely used algorithm due to its advantages in security strength and computing efficiency. [0003] The SHA-1 algorithm was designed by the US National Institute of Standards and Technology and the US National Security Agency, and was adopted by the US government as the US N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/15H04L29/06
Inventor 吴卿张奇锋倪永军周兴武金恭华赵俊杰郁伟炜吴鹏曾虹
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products