Cryptographic hash functions based on generalized cellular automata
نویسندگان
چکیده
منابع مشابه
Cellular Automata Based Cryptographic Hash Function
* This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2011-0014977). Abstract Recently, in many applications where speed is important and very large amounts of data have to be authenticated, hardware implementation is demanded as a natural solution. A cellular automata (C...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Cryptographic hash functions based on ALife
There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, and such functions are also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, permutationbased schemes, chaotic mixing, and so on. Herein we introduce the notion of an artificial-life (ALife) hash function (ALHF), wh...
متن کاملCryptographic hash functions based on Artificial Life
There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, with such functions also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, recursive permutation-based schemes, chaotic mixing, and so on. Herein we introduce the notion of an Artificial Life (or ALife) hash function...
متن کاملAnalysis of Hash Functions and Cellular Automata Based Schemes
In this paper, we summarize hash functions and cellular automata based architectures, and discuss some pros and cons. We introduce the background knowledge of hash functions. The properties and theory of cellular automata are also presented with typical works. We show that cellular automata based schemes are very useful to design hash functions with a low hardware complexity because of its logi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science and Education of the Bauman MSTU
سال: 2013
ISSN: 1994-0408
DOI: 10.7463/0113.0534640