One-way hash functions based on iterated chaotic systems

被引:0
作者
Peng, Fei [1 ]
Qiu, Shui-Sheng [2 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Changsha, Hunan Province, Peoples R China
[2] South China Univ Technol, Coll Elect Informat, Guangzhou, Guangdong, Peoples R China
来源
2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Constructions of one-way hash functions based on chaotic systems are studied where the compression function is designed with iterated chaotic systems. A general model is presented and two kinds of schemes are introduced according to different post-processing procedure. Based on the general model, we present two examples. Analysis shows that they behave fairly well. The general approach opens a novel way to design one-way hash functions.
引用
收藏
页码:1070 / +
页数:2
相关论文
共 23 条
[1]  
ALVAREZ G, 1999, 33 ANN 1999 INT CARN, P221
[2]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[3]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[4]  
HABUTSU T, 1991, LECT NOTES COMPUT SC, V547, P127
[5]   Chaos and cryptography: Block encryption ciphers based on chaotic maps [J].
Jakimoski, G ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) :163-169
[6]  
KOHDA T, 1996, SCIS9611C
[7]  
Li Hong-Da, 2003, Chinese Journal of Computers, V26, P460
[8]  
LI S, 2003, ANAL NEW DESIGNS DIG
[9]   A block cipher based on a suitable use of the chaotic standard map [J].
Lian, SG ;
Sun, JS ;
Wang, ZQ .
CHAOS SOLITONS & FRACTALS, 2005, 26 (01) :117-129
[10]  
Liu Junning, 2000, Journal of Tsinghua University (Science and Technology), V40, P55