Font Size: a A A

Research On Hash Function Based On Chaotic Mapping

Posted on:2012-09-15Degree:MasterType:Thesis
Country:ChinaCandidate:A J LiaoFull Text:PDF
GTID:2178330335951872Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of network technology, through the network to the security of the information flow more and more attention. Chaos as a kind of non-linear phenomena, has the rail unpredictability, boundedness, good pseudo-random characteristics, and the extremely sensitive characteristics of chaotic initial condition and system parameters. This series is worth to use meet the characteristics of cryptography, so chaotic encryption various requirements as a new encryption technology is more and more attention and research, develop very quickly. The Hash function widely applied in all kinds of security applications, such as completeness inspection, digital authentication, digital signatures, etc., it is the basis of modern network information security, so the Hash function based on chaotic encryption has very important research value and practical significance.This paper introduced chaos in the research status of Hash encryption technology, basic concepts of cryptography, Hash function based and the basic theory of chaos and analyzes the several ripe Hash algorithm. Then, put forward the hybrid chaos hash algorithm proposed in this paper, this method the two-dimensional Logistic chaos mapping combined with two-dimensional Chebyshev chaos mapping forms double chaotic systems to generate chaotic sequences, as the dynamic parameter to replace traditional hashing algorithm SHA - 512 fixed parameters, and participate in the original algorithm function that wheel hash based computing. The algorithm analysis results show that this method has excellent key space, initial value and key sensitivity and security.This research combines two-dimensional Logistic chaos mapping and two-dimensional Chebyshev chaos mapping has great advantage, generating a key space mixed chaos series, and to subtracted relative stochastic dynamic parameters involved in the traditional hashing algorithms, further enhance the safety of SHA - 512 algorithm.
Keywords/Search Tags:Cryptography, Chaos, Chaotic Encryption, Hash
PDF Full Text Request
Related items