Method for password protection for constructing unidirectional hash function based on infinite dimension ultra-chaos

A one-way hash function and password protection technology, applied in the field of information security, can solve problems such as easy collisions

Inactive Publication Date: 2008-08-06
XIAN UNIV OF TECH
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Others proposed to construct a one-way Hash function based on the space-time chaotic system. When using the one-way Hash function technology for passwor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for password protection for constructing unidirectional hash function based on infinite dimension ultra-chaos
  • Method for password protection for constructing unidirectional hash function based on infinite dimension ultra-chaos
  • Method for password protection for constructing unidirectional hash function based on infinite dimension ultra-chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0050] The invention first constructs a high-performance one-way hash function by using hyper-chaos and key flow, and then uses the function to encrypt passwords.

[0051] The plaintext (the password to be protected) and the key are used as the initial values ​​of two hyperchaotic Chen systems with delayed feedback, and the evolution is carried out for a certain period of time according to the chaotic dynamic characteristics of the two systems, and the final result of the evolution is quantified, and the The quantized value is substituted into the key stream for iteration to realize the confusion and diffusion of plaintext and key information, and based on the cipher block chaining method, a 128-bit hash value of plaintext of any length is generated, and the hash value of the password to be authenticated is combined with the hash value of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for cryptoguard by utilization of infinite dimensional hyperchaos for construction of unilateral hash functions, wherein, a plaintext and a key are taken as initial values of two hyperchaos Chen systems provided with delay feedback at first; evolvement is performed according to characteristics of chaotic dynamics of the system; a final result of evolvement is quantized; the quantized value is substituted into key streams for iteration; confusion and diffusion of plaintext information and key information are realized, and a 128-bit Hash value of the plaintext with any length is generated on the basis of a cipher block chain mode. The method of the invention performs cryptoguard by construction of the Hash functions, fully utilizes signals generated by an infinite dimensional hyperchaos system to improve the scrambling performance of the signals and the sensitivity of parameters, and has stronger attack resistance and better safety to predicted attacks.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a password protection method, in particular to a method for password protection using a one-way hash (Hash) function constructed by an infinite-dimensional hyperchaotic characteristic and a key stream. Background technique [0002] The cryptographic one-way hash (Hash) function is one of the most important cryptographic encoding methods in use today. Hash functions are widely used in the IT industry, security protocols and programs, for example, software integrity testing, digital signature systems, message authentication and password protection, etc. Hash functions are an important basis for IT industry and security protocols, and typical applications include digital signatures and password protection. With the rapid development of modern commerce, finance and other fields, long-distance transactions and communications are becoming more and more important. At this time, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
Inventor 任海鹏庄元
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products