TENG Fei,LI Yongzhen*.Design and implementation of efficient hash function in blockchain technology[J].Journal of Yanbian University,2021,47(03):233-237.
区块链技术中高效散列函数的设计与实现
- Title:
- Design and implementation of efficient hash function in blockchain technology
- 文章编号:
- 1004-4353(2021)03-0233-05
- 关键词:
- 区块链; 哈希函数; SHA - 256算法
- Keywords:
- blockchain; Hash function; SHA - 256 algorithm
- 分类号:
- TP391.41
- 文献标志码:
- A
- 摘要:
- 为提高传统的SHA - 256算法在区块链技术中的计算效率,对传统的SHA - 256算法中的迭代结构进行了改进.实验结果表明,在保证数据的安全性下,改进的64次迭代的SHA - 256算法和改进的32次迭代的SHA - 256算法的计算效率比传统的SHA - 256算法分别提高了24%和140%,改进的32次迭代的SHA - 256算法的平均计算效率比MD5算法提高了32%.因此,该改进算法可为提高区块链技术的计算效率提供参考.
- Abstract:
- In order to solve the problem that the traditional SHA - 256 algorithm has relatively low computational efficiency in blockchain technology, the iterative structure of the traditional SHA - 256 algorithm is improved. Experimental results show that the computing efficiency of the improved SHA - 256 algorithm with 64 iterations and 32 iterations is 24% and 140% higher than that of the traditional SHA - 256 algorithm, respectively, and the SHA - 256 algorithm with 32 iterations is 32% higher than that of MD5 algorithm on average, while the security of the improved SHA - 256 algorithm is guaranteed. Therefore, the improved algorithm can provide a reference for improving the computational efficiency of blockchain technology.
参考文献/References:
[1] 周李京.区块链隐私关键技术研究[D].北京:北京邮电大学,2019.
[2] 王化群,吴涛.区块链中的密码学技术[J].南京邮电大学学报(自然科学版),2017,37(6):61-67.
[3] 付金华.高效能区块链关键技术及应用研究[D].郑州:战略支援部队信息工程大学,2020.
[4] 刘飞.Hash函数研究与设计[D].南京:南京航空航天大学,2012.
[5] LIU Y H, ZHANG S.Information security and storage of Internet of Things based on block chains[J].Future Gener Comp Sy, 2020,106:296-303.
[6] 韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019,45(1):206-225.
[7] LI W T, LU Z P.Research on supply chain management based on block chain technology[C]//Proceedings of the 2nd Asia - Pacific Social Science and Modern Education Conference(SSME 2019).Shanghai: Atlantis Press, 2019:7-11.
[8] PEREZ M R, GERARDO B, Medina R.Applying modified SHA256 on blockchain using challenge response and off - chain signatures patterns[C]//Proceedings of the the 3rd International Conference on Graphics and Signal Processing(ICGSP 2019).Visayas: ACM, 2019:58-61.
[9] 陈震宇.面向联盟区块链的高性能关键技术研究[D].杭州:浙江工业大学,2020.
[10] ALGREDO-BADILLO I, FEREGRINO-URIBE C, CUMPLIDO R, et al.FPGA - based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA - 256[J].Microprocess Microsy, 2013,37(6/7):750-757.
[11] MICHAIL H E, ATHANASIOU G S, KELEFOURAS V, et al.On the exploitation of a high - throughput SHA - 256 FPGA design for HMAC[J].ACM T Reconfig Techn(TRETS), 2012,5(1):1-28.
[12] HUANG X Y, SHEN F, TENG J H.The nonlinear analysis of SHA - 256[C]//Proceedings of the 2011 IEEE International Conference on Information Theory and Information Security(ICITIS 2011).Zhengzhou: IEEE, 2011:88-90.
备注/Memo
收稿日期: 2021-03-17
*通信作者: 李永珍(1971—),男,博士,副教授,研究方向为网络安全和无线网络协议.