One-way Hash function construction based on iterating a chaotic map

被引:13
作者
Wang, Yong [1 ]
Du, Maokang [2 ]
Yang, Degang [3 ]
Yang, Huaqian [4 ]
机构
[1] Chongqing Univ, Sch Comp Sci & Engn, Chongqing 400044, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Econ & Management, Chongqing 400065, Peoples R China
[3] Chongqing Normat Univ, Sch Math & Comp Sci, Chongqing 400047, Peoples R China
[4] Chongqing Educ Coll, Dept Comp & Modern Educ, Chongqing 400067, Peoples R China
来源
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS | 2007年
关键词
D O I
10.1109/CIS.Workshops.2007.16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An algorithm for one-way Hash function construction based on iterating a chaotic map is proposed The total chaotic space is divided into some subspace based on the density distribution function of the chaotic map. Each subspace is associated with a unique bit in a bit sequence. The value of the chaotic map is dynamically decided by the last-time value and the corresponding message bit in different positions. When the chaotic value is in one subspace, changes the corresponding bit. Finally, the bit sequence is used as the Hash value. Theoretical analysis and computer simulation indicate that the algorithm can resist statistical attack birthday attack and meet-in-the-middle attack and satisfy all performance requirement of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.
引用
收藏
页码:791 / +
页数:2
相关论文
共 50 条
[41]   ONE-WAY HASH FUNCTIONS [J].
SCHNEIER, B .
DR DOBBS JOURNAL, 1991, 16 (09) :148-150
[42]   Keyed hash function based on a chaotic map [J].
Kanso, A. ;
Yahyaoui, H. ;
Almulla, M. .
INFORMATION SCIENCES, 2012, 186 (01) :249-264
[43]   Hash function based on chaotic map lattices [J].
Wang, Shihong ;
Hu, Gang .
CHAOS, 2007, 17 (02)
[44]   Analysis and improvement of hash function construction based on chaotic coupled map network [J].
College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, China .
J. Comput. Inf. Syst., 13 (5437-5444) :5437-5444
[45]   An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol [J].
Ren, Xuping ;
Xu, Xianghua ;
Li, Yunfa .
JOURNAL OF COMPUTERS, 2013, 8 (09) :2405-2412
[46]   One-way function construction based on the MQ problem and logic function [J].
Sun Yanjun ;
Liu Changming ;
Li Haiyu ;
Yuan Zhe .
ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 :2360-+
[47]   On the security of an image encryption scheme based on one-way chaotic function [J].
Xie, Bangyong ;
Wang, Deshi ;
Liu, Shihua .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (06) :52-55
[48]   Study of one-way hash function to digital signature technology [J].
Zhou Chuan-hua ;
Zhu Ge-mei ;
Zhao Bao-hua ;
Li Gong .
Proceedings of e-ENGDET2006, 2006, :310-313
[49]   Study of one-way hash function to digital signature technology [J].
Zhou, Chuanhua ;
Zhu, Gemei ;
Zhao, Baohua ;
Wei, Wei .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1503-1506
[50]   Study of one-way hash function to digital signature technology [J].
Zhou, Chuanhua ;
Zhao, Baohua ;
Li, Gong .
DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, :1144-1147