[1]赵耿,袁阳,王冰.基于交叉耦合映象格子的单向Hash函数构造[J].东南大学学报(自然科学版),2009,39(4):728-732.[doi:10.3969/j.issn.1001-0505.2009.04.015] 　Zhao Geng,Yuan Yang,Wang Bing.One-way Hash function construction based on crossing coupled map lattice[J].Journal of Southeast University (Natural Science Edition),2009,39(4):728-732.[doi:10.3969/j.issn.1001-0505.2009.04.015] 点击复制 基于交叉耦合映象格子的单向Hash函数构造() 分享到： var jiathis_config = { data_track_clickback: true };

39

2009年第4期

728-732

2009-07-20

文章信息/Info

Title:
One-way Hash function construction based on crossing coupled map lattice

Author(s):
School of Telecommunication Engineering, Xidian University, Xi’an 710071, China
Department of Computer Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China

Keywords:

TP309
DOI:
10.3969/j.issn.1001-0505.2009.04.015

Abstract:
In order to solve the problems in Hash function construction based on chaos system and improve the performance of Hash function, an algorithm for constructing one-way Hash function based on the crossing coupled map lattice is presented. Using the crossing coupled map lattice as a core, the algorithm takes full advantage of the performance of chaos and diffusion, which are different from the ordinary spatiotemporal chaos systems. First, the groups of plaintexts are injected in parallel to each grid of the crossing coupled map lattice. Then, the good performance of chaos is exhibited through multiple iterations. The Logistic mapping is used as a key generator and the results are modulated by the algorithm. The experimental results show that the proposed algorithm satisfies all the performance requirements of Hash function. It has high sensitivity of the initial value, diffusion ability and collision-resistent ability. With high security, high efficiency and great extensibility, the algorithm provides a nice attempt for the construction of Hash function based on chaos.

参考文献/References:

[1] Wang Xiaoyun,Yu Hongbo.How to break MD5 and other hash functions[C] //Advances in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:19-35.
[2] Wang Xiaoyun,Yin Yiqun Lisa,Yu Hongbo.Finding collisions in the full SHA-1[C] //Advances in Cryptology CRYPTO 2005.Berlin,Germany:Springer-Verlag,2005:17-36.
[3] 刘军宁,谢杰成,王普.基于混沌映射的单向Hash函数构造[J].清华大学学报:自然科学版,2000,40(7):55-58.
Liu Junning,Xie Jiecheng,Wang Pu.One-way Hash function construction based on chaotic mappings[J].J Tsinghua Univ:Sci and Tech,2000,40(7):55-58.(in Chinese)
[4] 金晨辉,杨阳.对自同步混沌密码的分割攻击方法[J].电子学报,2006,34(7):1337-1341.
Jin Chenhui,Yang Yang.A divide-and-conquer attack on self-synchronous chaotic ciphers[J]. Acta Electronica Sinica,2006,34(7):1337-1341.(in Chinese)
[5] 韦鹏程,张伟,廖晓峰,等.基于双混沌系统的带秘密密钥散列函数构造[J].通信学报,2006,27(9):27-33.
Wei Pengcheng,Zhang Wei,Liao Xiaofeng,et al.Design keyed Hash function based on couple chaotic system[J].Journal on Communications,2006,27(9):27-33.(in Chinese)
[6] 刘建东,余有明.基于可变参数双向耦合映象系统的时空混沌Hash函数设计[J].物理学报,2007,56(3):1297-1304.
Liu Jiandong,Yu Youming.A TCML-based spatiotemporal chaotic one-way Hash function with changeable-parameter[J].Acta Phys Sin,2007,56(3):1297-1304.(in Chinese)
[7] 杨维明.时空混沌和耦合映象格子[M].上海:上海科学技术教育出版社,1994:65-69.
[8] Islam M N,Mia M,Chowdhury M.Effect of security increment to symmetric data encryption through AES methodology[C] //The 2008 Ninth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing.Phuket,Thailand,2008:291-294.
[9] Wong K W.A combined chaotic cryptographic and Hashing scheme[J].Phys Lett A,2003,307(5):292-298.
[10] 刘建东,付秀丽.基于耦合帐篷映射的时空混沌单向Hash函数构造[J].通信学报,2007,28(6):30-38.
Liu Jiandong,Fu Xiuli.Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps[J].Journal on Communications,2007,28(6):30-38.(in Chinese)

相似文献/References:

[1]陈汉武,李志强,徐宝文.置换群与整数间一对一 Hash函数的构建[J].东南大学学报(自然科学版),2008,38(2):225.[doi:10.3969/j.issn.1001-0505.2008.02.008]
Chen Hanwu,Li Zhiqiang,Xu Baowen.Construction of one-for-one Hash function mapping between permutation group and integral number[J].Journal of Southeast University (Natural Science Edition),2008,38(4):225.[doi:10.3969/j.issn.1001-0505.2008.02.008]