Data Information Security Algorithm Based on Chaos and Hash Function
نویسندگان
چکیده
Abstract Chaotic systems are characterized by unidirectional, diffusive and initial value sensitivity of hash. Academia can use it to optimize algorithms for mathematical computer encryption keys. This paper focuses on a hash function mixed chaotic system with key. Then the state mapping relationship modified, conclusions obtained. optimal design messy technology key is introduced briefly. A dynamic model improved parameters proposed prevent chaos from affecting speed security algorithm. The results show that this method effectively resist attack forging peer Moreover, computation required algorithm almost negligible.
منابع مشابه
An Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملInformation Security using Genetic Algorithm and Chaos
Security, integrity, non-repudiation, confidentiality, and authentication services are the most important factors in information security. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The application of a genetic algorithm (GA) to the field of cryptology is rather...
متن کاملOne-Way Hash Function based on Cascade Chaos
This paper proposes a novel hash function construction based on cascade chaos. Firstly, the L-length original message is divided into a number of blocks according to every character, which are transformed into corresponding ASCII values. Then the ASCII values are normalized into the interval of (0, 1), which compose a big array with the L-length. Regarding the first normalized ASCII value with ...
متن کاملResearch of RFID Certification Security Protocol based on Hash Function and DES Algorithm
RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security probl...
متن کاملcompactifications and function spaces on weighted semigruops
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied mathematics and nonlinear sciences
سال: 2023
ISSN: ['2444-8656']
DOI: https://doi.org/10.2478/amns.2023.1.00142