Professional Documents
Culture Documents
Hàm Băm An Toàn Và NG D NG
Hàm Băm An Toàn Và NG D NG
ng dng ca cc cng c trong .NET 2008 trong vic k mt ti liu, kim tra ti liu va c k xem c b thay i trong qu trnh truyn hay khng, sinh public, private key da trn cng c ny. V t pass word cho private key, hng dn s dng mt s th vin trong .NET2008 KT LUN Lun vn ca ti lm sng t v hm bm, tn cng hm bm, nghin cu BLAKE-256, ng dng ca BLAKE-256 trong vic k ti liu. Vy hng nghin cu tip theo ca ti l kt hp gia BLAK-256 v RSA trong vic k ti liu. Nghin cu cc phng php tn cng hm bm hin ti, a ra hng khc phc . Tm hiu cc th vin v hm bm trn cc mi trng Linux, Windows.
References [1] GS.TS Nguyn Bnh, TS. Trn c S. Gio trnh c s l thuyt mt m. Ban c yu chnh ph, hc vin k thut mt m, H ni nm 2000. [2] TS Nguyn nh Vinh, Gio trnh c s an ton thng tin, Ban c yu chnh ph, hc vin k thut mt m, H ni nm 2006. [3] L Ph , Nguyn Cnh Hong, Nguyn Thanh Hng, Hm bm an ton SHA-3, bo co ti h i tho CNTT quc gia ln th 14 ti i Hc Cn Th. [1] [4] Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, EUROCRYPT 2005, LNCS 3494, pp.19-35, Springer-Verlag, 2005. [5] Jean-Philippe Aumasson, Luca Henzen, Willi Meier, and Raphael C.-W. Phan. SHA-3 proposal BLAKE. Submission to NIST, 2008 [6] Man Young Rhee. Internet Security. Nh xut bn John Wiley and Sons, nm 2003. [7] A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography, CRC Press, Inc., October 1997. [8] Yaser Esmaeili Salehani, S. Amir Hossein A.E. Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh NESHA-256, NEw 256-bit Secure Hash Algorithm, nm2009. [9] Mt s trang web ting Anh. - http://msdn.microsoft.com/en-us/library/aa379866(v=VS.85).aspx - http://en.kioskea.net/contents/crypto/certificat.php3 - http://webdev.sis.pitt.edu/st/authenticode/authen4.htm - http://www.131002.net/blake/