Font Size: a A A

Design And Implementation Of A Hash Algorithm Based On Chaotic Logistic Equation

Posted on:2019-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:C P MaFull Text:PDF
GTID:2428330542972991Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the era of rapid development of information,how to protect important data is one of the most urgent tasks to solve.As an effective tool for data protection-Chaos Hash technology has been one of the hot research fields of information science.In the field of information security,the use of message digests,digital fingerprinting,password verification,information integrity check codes,operation check codes,and so on.They ensure the security of data information.in some extent.In this paper,a mapping equation based on chaotic Logistic is proposed to change the initial parameter a and the control parameter w,so that they can be combined with the information inputted by the user,and the value of each iteration is related to it,instead of fixing all values for chaos calculation into one space.The value of the fixed space becomes the following plaintext,which makes the hacker's attack more difficult.At present,with multi-core processor chip equipment more and more,the use of parallel technology is more and more wide.Although application efficiency has improved to some extent,constructing hash algorithm with chaotic Logistic equation,adapting to multicore operating environment,as well as integrating into the parallel technology to deal with data security problem facing the world,which is a new development trend of data protection field.The test part follows the structure diagram of the algorithm and follows the single variable principle to test the performance of the algorithm.The chaotic mapping result distribution map,initial value sensitive map,and distribution histogram of chaotic sequence are used to verify whether the hash value generated by the algorithm conforms to the basic features of chaos.Experimental results show that the algorithm passes all NIST test functions and anti-collision statistics analysis.Both the timeliness of parallelism and the security of data protection have been improved,and it has broad application prospects.
Keywords/Search Tags:chaos, hash-function, data-security, Logistic, parallel-computing
PDF Full Text Request
Related items