Skip to main content
Erschienen in: Neural Computing and Applications 1/2011

01.02.2011 | Original Article

A novel Hash algorithm construction based on chaotic neural network

verfasst von: Yantao Li, Shaojiang Deng, Di Xiao

Erschienen in: Neural Computing and Applications | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An algorithm for constructing a one-way novel Hash function based on two-layer chaotic neural network structure is proposed. The piecewise linear chaotic map (PWLCM) is utilized as transfer function, and the 4-dimensional and one-way coupled map lattices (4D OWCML) is employed as key generator of the chaotic neural network. Theoretical analysis and computer simulation indicate that the proposed algorithm presents several interesting features, such as high message and key sensitivity, good statistical properties, collision resistance and secure against meet-in-the-middle attacks, which can satisfy the performance requirements of Hash function.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kwok HS, Tang WKS (2005) A chaos-based cryptographic Hash function for message authentication. Int J Bifur Chaos 15:4043–4050CrossRef Kwok HS, Tang WKS (2005) A chaos-based cryptographic Hash function for message authentication. Int J Bifur Chaos 15:4043–4050CrossRef
2.
Zurück zum Zitat Gao W, Li F, Wang XL (2009) Chameleon Hash without key exposure based on schnorr signature. Comput Stand Interfaces 31:282–285CrossRef Gao W, Li F, Wang XL (2009) Chameleon Hash without key exposure based on schnorr signature. Comput Stand Interfaces 31:282–285CrossRef
3.
Zurück zum Zitat Lian SG, Sun JS, Wang ZQ (2006) Secure Hash function based on neural network. Neurocomputing 69:2346–2350CrossRef Lian SG, Sun JS, Wang ZQ (2006) Secure Hash function based on neural network. Neurocomputing 69:2346–2350CrossRef
4.
Zurück zum Zitat Lin IC, Ou HH, Hwang MS (2005) A user authentication system using back-propagation network. Neural Comput Appl 14:243–249CrossRef Lin IC, Ou HH, Hwang MS (2005) A user authentication system using back-propagation network. Neural Comput Appl 14:243–249CrossRef
6.
Zurück zum Zitat Xiao D, Liao XF, Deng SJ (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24:65–71MathSciNet Xiao D, Liao XF, Deng SJ (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24:65–71MathSciNet
7.
Zurück zum Zitat Yi X (2005) Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II-Express Briefs 52:354–357CrossRef Yi X (2005) Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II-Express Briefs 52:354–357CrossRef
8.
Zurück zum Zitat Zhang JS, Wang XM, Zhang WF (2007) Chaotic keyed Hash function based on feedforward–feedback nonlinear digital filter. Phys Lett A 362:439–448CrossRef Zhang JS, Wang XM, Zhang WF (2007) Chaotic keyed Hash function based on feedforward–feedback nonlinear digital filter. Phys Lett A 362:439–448CrossRef
9.
Zurück zum Zitat Wang Y, Liao XF, Xiao D, Wong KW (2008) One-way Hash function construction based on 2D coupled map lattices. Inform Sci 178:1391–1406CrossRef Wang Y, Liao XF, Xiao D, Wong KW (2008) One-way Hash function construction based on 2D coupled map lattices. Inform Sci 178:1391–1406CrossRef
10.
Zurück zum Zitat Xiao D, Liao XF, Deng SJ (2008) Parallel keyed Hash function construction based on chaotic maps. Phys Lett A 372:4682–4688CrossRefMathSciNet Xiao D, Liao XF, Deng SJ (2008) Parallel keyed Hash function construction based on chaotic maps. Phys Lett A 372:4682–4688CrossRefMathSciNet
11.
Zurück zum Zitat Liu XD, Xiu CB (2008) Hysteresis modeling based on the hysteretic chaotic neural network. Neural Comput Applic 17:579–583 Liu XD, Xiu CB (2008) Hysteresis modeling based on the hysteretic chaotic neural network. Neural Comput Applic 17:579–583
12.
Zurück zum Zitat Deng SJ, Xiao D, Li YT, Peng WB (2009) A novel combined cryptographic and Hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simulat 14:3889–3900CrossRefMathSciNet Deng SJ, Xiao D, Li YT, Peng WB (2009) A novel combined cryptographic and Hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simulat 14:3889–3900CrossRefMathSciNet
13.
Zurück zum Zitat Deng SJ, Li YT, Xiao D (2009) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15:1338–1347CrossRefMathSciNet Deng SJ, Li YT, Xiao D (2009) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15:1338–1347CrossRefMathSciNet
14.
Zurück zum Zitat Rachel MK, Einat K, Ido K,Wolfgang (2003) Public channel cryptography by synchronization of neural networks and chaotic maps. Phys Rev Lett 91:118701/1-118701/4 Rachel MK, Einat K, Ido K,Wolfgang (2003) Public channel cryptography by synchronization of neural networks and chaotic maps. Phys Rev Lett 91:118701/1-118701/4
15.
Zurück zum Zitat Liu GL, Shan L, Dai YW et al (2006) One-way Hash function based on chaotic neural network. Acta Phys Sin 55:06–5688 (in Chinese)MathSciNet Liu GL, Shan L, Dai YW et al (2006) One-way Hash function based on chaotic neural network. Acta Phys Sin 55:06–5688 (in Chinese)MathSciNet
16.
Zurück zum Zitat Yang HQ, Wong KW, Liao XF et al (2009) One-way Hash function construction based on chaotic map network. Chaos Solitons Fractals 41:2566–2574CrossRef Yang HQ, Wong KW, Liao XF et al (2009) One-way Hash function construction based on chaotic map network. Chaos Solitons Fractals 41:2566–2574CrossRef
17.
Zurück zum Zitat Xiao D, Liao XF, Wang Y (2009) Parallel keyed Hash function construction based on chaotic neural network. Neurocomputing 72:2288–2296CrossRef Xiao D, Liao XF, Wang Y (2009) Parallel keyed Hash function construction based on chaotic neural network. Neurocomputing 72:2288–2296CrossRef
18.
Zurück zum Zitat Vanstone SA, Menezes AJ, Oorschot PC (1996) Handbook of applied cryptography. CRC Press, New York Vanstone SA, Menezes AJ, Oorschot PC (1996) Handbook of applied cryptography. CRC Press, New York
Metadaten
Titel
A novel Hash algorithm construction based on chaotic neural network
verfasst von
Yantao Li
Shaojiang Deng
Di Xiao
Publikationsdatum
01.02.2011
Verlag
Springer-Verlag
Erschienen in
Neural Computing and Applications / Ausgabe 1/2011
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-010-0432-2

Weitere Artikel der Ausgabe 1/2011

Neural Computing and Applications 1/2011 Zur Ausgabe

Premium Partner