Font Size: a A A

Study Of Chaotic Hash Function And Its Aplication In Electronic Commerce Security

Posted on:2010-08-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:N JiangFull Text:PDF
GTID:1118360275958076Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
In recent years,as the development and popularization of Internet technology,the application of Internet shopping,Internet banking,and digital signature become more and more prevalent.Although the development of electronic commerce is marvelous,it still has safety problem,which is how to guarantee the safety of data transfer and identification of buyers or sellers.In electronic commerce,we use digital signature and authentication technology based on One-way Hash function to ensure the integrity of transaction data,the authentication of dealers and the non-rupudiation of transaction information.But the existing standard hash function has security problem,therefore,the construction of a new and security Hash function has become more important to the electronic commerce safety.The purpose of this dissertation is to use irreversal of the chaotic system iteration process to construction chaotic Hash function,and apply it to digital signature,authentication and mobile micropayment protocol.This paper uses construction study of Hash function which is based on chaotic theory and connection with the requirement of electronic commerce security and mobile payment,which designs one time password authentication protocol and mobile micropayment protocol,is adopted as research subject,and the following work are organized in this dissertation.(1) This research imports the sinusoidal factor,frequency factor,and phase control parameter to gain H(?)non-like chaotic mapping.The mapping is simple and has bigger parameters space,it is also difficult to be iterated inversely.This paper analyzes chaotic characteristics of mapping based on chaotic theory,it also discusses the maximum Lyapunov index of the H(?)non-like system.We obtain the emulational result of sensitivity of H(?)non-like system to the initial value and parameters.(2) Design stream cipher algorithm based on H(?)non-like chaotic system.Because of its sensitivity to initial conditions and parameters along with pseudo-random of the iteration sequence of H(?)non-like,we presents a key sequence algorithm based on H(?)non-like chaotic system.The algorithm brings parameter and initial values into chaotic map and produces arbitrary length chaotic sequences by iteration,and quantifies them to gain key sequence that has good statistic character.The dissertation also analyzes the chaotic sequence by computer experiments.The results show that this chaotic sequence is well-proportioned and has good randomicity,meanwhile it has larger key space and can guarantee the security of plain-text effectively.(3) After analyzing current typical Hash function and chaotic Hash function design scheme and its shortages and on basis of chaotic theory and Hash function theory.We propose a chaotic Hash function construction algorithm based on H(?)non-like chaotic system. It is very sensitive for initial value and parameters.The algorithm constructs chaotic Hash function by repeating iteration and commutation messages.Theoretical analysis and computer simulation demonstrate that it can satisfy all the performance requirements of Hash function and it is simply and easy to realize.(4) By analyzing typical authentication schemes,especially S/KEY schemes in one time password,a new authentication protocol COTP is proposed.Different from other one time protocols,it gives the algorithm of chaotic scramble sort table and applies the scramble sort algorithm instead of real iteration times in the log on process.Gives the idea of encrypting to the seeds of protocol,theoretical analysis and computer simulation demonstrate that the COTP can resist little numbers attack,replay attack,internal attack and encryption seed and the times of iteration for transform,that realizes authentication between client and server.(5) By analyzing current micropayment protocols,it points out its problems in security and operation efficiency,and designs mobile micropayment protocol CMP based on chaotic dual Hash chain.The protocol is chiefly for the demand of lower value network information service charge,it utilizes the one way character of the iteration process of H(?)non-like chaotic system to cnstruct two Payword chains.It charges merchants by Payword chain one,and charges for users by the other Payword chain.CMP has the anonymous character,the information ordered by users is confidentiality and it has partial fairness character.Analysis results demonstrate that the CMP has higher security and faster operation efficiency.Partial fair CMP is suitable for those micropayment transactions whose trade amount is very small and which only require part fairness.
Keywords/Search Tags:Chaotic Hash Function, Digital Signature, Authentication, Scrambling Sort, dual Hash chain, Mobile Micropayment
PDF Full Text Request
Related items