-
A one-way hash function algorithm is proposed based on the chaos mapping and multiplicative congruential method. The initial value of the system is generated by the pseudo-random sequence which is obtained through the multiplicative congruential method. the normalized ASCII of the plaintext is used as the initial value of the chaos mapping. After a variable-step chaotic digital quantification, 128 bit hash value is extracted from the systems. Theoretical analysis and simulation results show that the proposed method has better characteristics of irreversibility, collision resistance, anti-forgery, initial sensitivity and higher operation speed.
-
Keywords:
- hash value /
- chaos mapping /
- hash function /
- sensitivity
[1] William S (translated by Meng Q S, Wang L N, Fu J M) 2007 Cryptography and Network Security Principles and Practices (4th Ed.) (Beijing: Electronic Industry Press) pp310--413 ( in Chinese) [威廉S 著 (孟庆树, 王丽娜, 傅建明译) 2007 密码编码学与网络安全: 原理与实践 (第4版) (北京: 电子工业出版社) 第310---413页]
[2] Guo W, Cao Y, Wang X M, He D K 2008 J. Commun. 29 93 (in Chinese) [郭伟, 曹杨, 王小敏, 何大可 2008 通信学报 29 93]
[3] Liu J N, Xie Q C, Wang P 2000 J. Tsinghua Univ. (Natural Science Edition) 40 55 (in Chinese) [刘军宁, 谢杰成, 王 普 2000 清华大学学报 (自然科学版) 40 55]
[4] Wang X M, Zhang J S, Zhang W F 2003 Acta Phys. Sin. 52 2737 (in Chinese) [王小敏, 张家树, 张文芳 2003 52 2737]
[5] Peng F, Qiu S S, Long M 2005 Acta Phys. Sin. 54 4562 (in Chinese) [彭飞, 丘水生, 龙敏 2005 54 4562]
[6] Wei P C, Zhang W, Liao X F, Yang H Q 2006 J. Commun. 27 27 (in Chinese) [韦鹏程, 张伟, 廖晓峰, 杨华千 2006 通信学报 27 27]
[7] Ren H P, Zhuang Y 2009 J. Commun. 30 100 ( in Chinese) [任海鹏, 庄元 2009 通信学报 30 100]
[8] Liu G J, Dan L, Dai Y W, Sun J S, Wang Z Q 2006 Acta Phys. Sin. 55 5688 (in Chinese) [刘光杰, 单梁, 戴跃伟, 孙金生, 王执铨 2006 55 5688]
[9] Wong K W 2003 Phys. Lett. A 307 292
[10] Liu Y Z, Lin C S, Li X C, Liu H P, Wang Z L 2011 Acta Phys. Sin. 60 030502 (in Chinese) [刘扬正, 林长圣, 李心朝, 刘海鹏, 王忠林 2011 60 030502]
[11] Wang J Z, Wang Y L, Wang M Q 2006 Acta Phys. Sin. 55 5048 (in Chinese) [王继志, 王英龙, 王美琴 2006 55 5048]
-
[1] William S (translated by Meng Q S, Wang L N, Fu J M) 2007 Cryptography and Network Security Principles and Practices (4th Ed.) (Beijing: Electronic Industry Press) pp310--413 ( in Chinese) [威廉S 著 (孟庆树, 王丽娜, 傅建明译) 2007 密码编码学与网络安全: 原理与实践 (第4版) (北京: 电子工业出版社) 第310---413页]
[2] Guo W, Cao Y, Wang X M, He D K 2008 J. Commun. 29 93 (in Chinese) [郭伟, 曹杨, 王小敏, 何大可 2008 通信学报 29 93]
[3] Liu J N, Xie Q C, Wang P 2000 J. Tsinghua Univ. (Natural Science Edition) 40 55 (in Chinese) [刘军宁, 谢杰成, 王 普 2000 清华大学学报 (自然科学版) 40 55]
[4] Wang X M, Zhang J S, Zhang W F 2003 Acta Phys. Sin. 52 2737 (in Chinese) [王小敏, 张家树, 张文芳 2003 52 2737]
[5] Peng F, Qiu S S, Long M 2005 Acta Phys. Sin. 54 4562 (in Chinese) [彭飞, 丘水生, 龙敏 2005 54 4562]
[6] Wei P C, Zhang W, Liao X F, Yang H Q 2006 J. Commun. 27 27 (in Chinese) [韦鹏程, 张伟, 廖晓峰, 杨华千 2006 通信学报 27 27]
[7] Ren H P, Zhuang Y 2009 J. Commun. 30 100 ( in Chinese) [任海鹏, 庄元 2009 通信学报 30 100]
[8] Liu G J, Dan L, Dai Y W, Sun J S, Wang Z Q 2006 Acta Phys. Sin. 55 5688 (in Chinese) [刘光杰, 单梁, 戴跃伟, 孙金生, 王执铨 2006 55 5688]
[9] Wong K W 2003 Phys. Lett. A 307 292
[10] Liu Y Z, Lin C S, Li X C, Liu H P, Wang Z L 2011 Acta Phys. Sin. 60 030502 (in Chinese) [刘扬正, 林长圣, 李心朝, 刘海鹏, 王忠林 2011 60 030502]
[11] Wang J Z, Wang Y L, Wang M Q 2006 Acta Phys. Sin. 55 5048 (in Chinese) [王继志, 王英龙, 王美琴 2006 55 5048]
Catalog
Metrics
- Abstract views: 7602
- PDF Downloads: 792
- Cited By: 0