A novel Hash algorithm construction based on chaotic neural network

被引:106
作者
Li, Yantao [1 ]
Deng, Shaojiang [1 ]
Xiao, Di [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Cryptography; Chaotic neural network; Hash function; Chaotic map; MAP;
D O I
10.1007/s00521-010-0432-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An algorithm for constructing a one-way novel Hash function based on two-layer chaotic neural network structure is proposed. The piecewise linear chaotic map (PWLCM) is utilized as transfer function, and the 4-dimensional and one-way coupled map lattices (4D OWCML) is employed as key generator of the chaotic neural network. Theoretical analysis and computer simulation indicate that the proposed algorithm presents several interesting features, such as high message and key sensitivity, good statistical properties, collision resistance and secure against meet-in-the-middle attacks, which can satisfy the performance requirements of Hash function.
引用
收藏
页码:133 / 141
页数:9
相关论文
共 17 条
[1]   A novel combined cryptographic and hash algorithm based on chaotic control character [J].
Deng, Shaojiang ;
Xiao, Di ;
Li, Yantao ;
Peng, Wenbin .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) :3889-3900
[2]   Chameleon hash without key exposure based on Schnorr signature [J].
Gao, Wei ;
Li, Fei ;
Wang, Xueli .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :282-285
[3]   A chaos-based cryptographic hash function for message authentication [J].
Kwok, HS ;
Tang, NS .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (12) :4043-4050
[4]   Secure hash function based on neural network [J].
Lian, Shiguo ;
Sun, Jinsheng ;
Wang, Zhiquan .
NEUROCOMPUTING, 2006, 69 (16-18) :2346-2350
[5]   A user authentication system using back-propagation network [J].
Lin, IC ;
Ou, HH ;
Hwang, MS .
NEURAL COMPUTING & APPLICATIONS, 2005, 14 (03) :243-249
[6]   One-way Hash function based on chaotic neural network [J].
Liu Guang-Jie ;
Shan Liang ;
Dai Yue-Wei ;
Sun Jin-Sheng ;
Wang Zhi-Quan .
ACTA PHYSICA SINICA, 2006, 55 (11) :5688-5693
[7]   Hysteresis modeling based on the hysteretic chaotic neural network [J].
Liu, Xiangdong ;
Xiu, Chunbo .
NEURAL COMPUTING & APPLICATIONS, 2008, 17 (5-6) :579-583
[8]  
RACHEL M, 2003, PHYS REV LETT, V91
[9]  
Vanstone S.A., 1996, Handbook of Applied Cryptography
[10]   One-way hash function construction based on 2D coupled map lattices [J].
Wang, Yong ;
Liao, Xiaofeng ;
Xiao, Di ;
Wong, Kwok-Wo .
INFORMATION SCIENCES, 2008, 178 (05) :1391-1406