Some weak points of one fast cryptographic checksum algorithm and its improvement
暂无分享,去创建一个
In this paper, we examine a previously published fast cryptographic checksum algorithm used for maintaining the integrity of files in an information system. We find two flaws in the previous analysis: it is possible to append information to a file and generate a new valid cryptographic checksum for the modified file, and it is possible to forge changes to blocks whose value is less than the modulus used in the scheme under examination. We then show how this method can be improved to eliminate these problems while still maintaining its other beneficial properties.
[1] Ralph Howard,et al. Data encryption standard , 1987 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[4] R. R. Jueneman,et al. A High Speed Manipulation Detection Code , 1986, CRYPTO.