当前位置:网站首页>Hash hash game system development explanation technology -- hash game system development solution analysis
Hash hash game system development explanation technology -- hash game system development solution analysis
2022-06-29 13:47:00 【VC_ MrsHu288】
Hash values have the following four characteristics :
1. High calculation efficiency ( It is very easy to calculate the hash value of any input value )
2. Anti conflict ( No two input values can give the same hash value )
3. Hide input information ( The input value cannot be inferred from the hash value )
4. The output should look random ( But the same input value will get the same hash value )
1/2. MD4/MD5/HAVAL
MD4:
Ron Rivest Design , Generate 128 Bit message digest value , Software systems for high-speed computing requirements , Optimized for microprocessors .
MD4 First fill in the message , Make sure the message is longer than 512 It's a small multiple 64 position , For example, one 16 Bit message to be filled 432 Bit data , To achieve 448 position (512*1-64).
MD4 Considered unsafe , Has been largely deprecated .
MD5:
Ron Rivest Design ,MD4 Upgraded version , Generate 128 Bit message digest value ,MD5 and MD4 First fill in the message , But the algorithm is more complex .
Added the fourth round of operation , There are studies that show that MD5 No enemy collision attack , It is no longer applicable to applications that need to resist collision attacks , Such as SSL And digital signatures .
MD5 Very widely used , Even if it proves to be no longer safe , however MD5 Now it is often used for file integrity verification , For example, some intrusion detection systems , And judicial evidence integrity verification Applications for non cryptographic purposes .
HAVAL:
be called Variable length hash , yes MD5 Revised edition , Use 1024 Bit block , Can produce 128、160、192、224 and 256 Bit hash value .HAVAL It also allows the user to specify the number of rounds used to generate the hash (3、4 or 5).
Unfortunately ,HAVAL Also in the 2004 It was broken around .
2/2. SHA series
Secure Hash Algorithms, secure hash algorithm .
SHA Series is made up of NSA Design 、NIST Release , And digital signature standard (Digital Signature Standard,DSS) Used together hash function —— Federal information processing standards (FIPS)180“ Secure hash standard ”(SHS).
SHA The original intention of the design is to be used in digital signature . An improvement made to meet the demand of the U.S. government for more secure hash algorithms .
You can't get around it NIST/NSA......
SHA(SHA-0):
SHA Generate 160 Bit hash value or message digest , The output is then fed into an asymmetric algorithm , Signature of the output message . Be similar to MD4, But more mathematical functions are used to resist brute force attacks , Including birthday attacks . Due to the existence of undisclosed “ Major defects ”, Revised shortly after publication SHA-1 replace .
SHA-1:
SHA-1 yes SHA Improved version ,SHA-1 No enemy collision attack , Therefore, it is not applicable to applications that need anti-collision attacks .
SHA-2/SHA-3:
SHA-2 and SHA-3 As SHA Upgraded version , At present, the industry believes that its security is applicable to any application scenario .
SHA-2 Generate message digest
What needs to be introduced is SHA-3:SHA-3 Use Keccak Algorithm , It supports and SHA-2 Same hash length , But its internal structure is similar to SHA The series is almost completely different .
2012 year Keccak Algorithm in NIST Of SHA-3 In the competition, he beat the famous Rivest It brings MD6 Including many algorithms , a SHA-3 The standard algorithm ,SHA-3 The purpose of is to directly replace... In the current application when necessary SHA-2, And significantly improved NIST Robustness of the overall hash algorithm toolkit ( That is, the ability of the system to resist change without changing the initial stable structure ).
Keccak Algorithm The sponge structure shown in the figure below is used . Based on wide random functions or random permutations , It allows you to input any number of data , And output any number of data , This brings a lot of flexibility .
The sponge function of unknown force / Sponge structure
MD5/SHA Series hash function attribute table
边栏推荐
- Summary of common MySQL statements and commands
- CVPR 2022 | unknown target detection module study: learning unknown targets in video
- Rslo: self supervised lidar odometer (real time + high precision, icra2022)
- 丢弃 Tkinter!简单配置快速生成超酷炫 GUI!
- leetcode 903. Effective arrangement of Di sequences
- B+ tree | MySQL index usage principle
- LeCun用62页论文公布未来十年研究计划:AI自主智能
- The node command in the script does not print the execution log on the console
- 技术分享| 融合调度中的广播功能设计
- 六月集训(第29天) —— 分而治之
猜你喜欢

【毕业季·进击的技术er】1076万毕业生,史上最难就业季?卷又卷不过,躺又躺不平,敢问路在何方?

How to make dapper support dateonly type

【无标题】安装依赖报错:Refusing to install package with name “***“ under a package
![[cloud resident co creation] break through the performance bottleneck of image recognition through rust language computing acceleration technology](/img/1a/c5e1e17d057c8b4ba2e57f28237498.png)
[cloud resident co creation] break through the performance bottleneck of image recognition through rust language computing acceleration technology

Uncover the secret! Pay attention to those machines under the membership system!
![[system design] proximity service](/img/3b/b0dbd25945f9c914b097140890d8f9.png)
[system design] proximity service

iMile 利用 Zadig 多云环境周部署千次,跨云跨地域持续交付全球业务

weserver发布地图服务

【毕业季】这四年一路走来都很值得——老学长の忠告

C language memory function
随机推荐
LeCun用62页论文公布未来十年研究计划:AI自主智能
如何让 Dapper 支持 DateOnly 类型
C language character function
C language memory function
力扣:合并两个有序链表
运动App如何实现端侧后台保活,让运动记录更完整?
云原生(三十一) | Kubernetes篇之Kubernetes平台基本预装资源
Xiaobai learns MySQL - incremental statistical SQL requirements - windowing function scheme
Weserver publishing map service
MySQL tuning
B+树|MYSQL索引使用原则
AOSP ~ initialization language
Acwing 234 abandoning testing
leetcode 522. Longest special sequence II
GEE——美国LANDFIRE火灾数据集
How can the sports app keep the end-to-side background alive to make the sports record more complete?
CVPR上百人中招新冠,emoji成“呈堂证供”,M2 MBP被曝硬盘降速,今日更多大新闻在此...
Cvpr2022 | a convnet for the 2020s & how to design neural network Summary
CVPR 2022 | unknown target detection module study: learning unknown targets in video
June training (day 29) - divide and rule