One-way hash functions based on iterated chaotic systems

被引:0
|
作者
Peng, Fei [1 ]
Qiu, Shui-Sheng [2 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Changsha, Hunan Province, Peoples R China
[2] South China Univ Technol, Coll Elect Informat, Guangzhou, Guangdong, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Constructions of one-way hash functions based on chaotic systems are studied where the compression function is designed with iterated chaotic systems. A general model is presented and two kinds of schemes are introduced according to different post-processing procedure. Based on the general model, we present two examples. Analysis shows that they behave fairly well. The general approach opens a novel way to design one-way hash functions.
引用
收藏
页码:1070 / +
页数:2
相关论文
共 50 条
  • [41] One-way functions
    Levin, L.A.
    Problemy Peredachi Informatsii, 2003, 39 (01): : 103 - 117
  • [42] Construct message authentication code with one-way hash functions and block ciphers
    Yeh, YS
    Wang, CC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (02) : 390 - 393
  • [43] Developing the concept of one-way functions for cryptographic security systems using achievements in chaotic dynamics
    Kostenko P.Yu.
    Antonov A.V.
    Kostenko T.P.
    Cybernetics and Systems Analysis, 2006, 42 (06) : 884 - 891
  • [44] One way Hash function construction based on chaotic mapping
    Liu, Junning
    Xie, Jiecheng
    Wang, Pu
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2000, 40 (07): : 55 - 58
  • [45] A Fast and Secure One-Way Hash Function
    El Bakrawy, Lamiaa M.
    Ghali, Neveen I.
    Hassanien, Aboul Ella
    Kim, Tai-Hoon
    SECURITY TECHNOLOGY, 2011, 259 : 85 - +
  • [46] Efficient constructions for one-way hash chains
    Hu, YC
    Jakobsson, M
    Perrig, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 423 - 441
  • [47] An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange
    Holbl, Marko
    Welzer, Tatjana
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 894 - 898
  • [48] Pseudorandom Generators based on one-way functions
    Gao, Shujing
    Song, Tingqiang
    Zhang, Wei
    Applied Decisions in Area of Mechanical Engineering and Industrial Manufacturing, 2014, 577 : 820 - 823
  • [49] Security analysis of a one-way hash function based on spatiotemporal chaos
    王世红
    单鹏洋
    Chinese Physics B, 2011, (09) : 87 - 93
  • [50] Security analysis of a one-way hash function based on spatiotemporal chaos
    Wang Shi-Hong
    Shan Peng-Yang
    CHINESE PHYSICS B, 2011, 20 (09)