A Hash Algorithm Based on Scalable Precision Chaos

An extended precision, hash algorithm technology, applied in the computer science field of hash technology, can solve the problems of errors in the calculation process, difficult reconstruction and prediction, limited computer word length, etc., to reduce conflicts and facilitate selection.

Inactive Publication Date: 2011-12-21
HARBIN INST OF TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] 2. The chaotic system is extremely sensitive to the initial state, and a very small deviation of the initial condition will cause a great difference in the results; that is, the so-called "butterfly effect" - "a butterfly in the tropical rainforest of the Amazon River Basin in South America, Occasionally, a few flaps of its wings may cause a tornado in Texas, USA in two weeks”;
[0017] 4. Deterministic randomness, the dynamic behavior of the chaotic system is extremely complex, does not conform to the principles of probability and statistics, and is close to white noise; therefore, it is difficult to reconstruct and predict
Because the chaos calculated bas

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hash Algorithm Based on Scalable Precision Chaos
  • A Hash Algorithm Based on Scalable Precision Chaos
  • A Hash Algorithm Based on Scalable Precision Chaos

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0048] Specific implementation mode 1: a hash table based on scalable precision chaos.

[0049] It is assumed here that the input information is three numbers 123 (keywords), and the address space of the hash table is 0 to 20.

[0050] The specific steps to implement the hash table based on scalable precision chaos are as follows:

[0051] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.

[0052] The input information is used as the initial parameters and control parameters of the Logistic mapping, respectively:

[0053] x 0 =0. 123 , a=3.9 123

[0054] Set the number of Logistic mapping iterations equal to 2, and specify that the number of digits of the obtained random sequence is equal to 20.

[0055] (2) Extensible precisi...

specific Embodiment approach 2

[0095] Embodiment 2: Information summarization based on scalable precision chaos.

[0096] Here it is assumed that the input information is a letter "q", and the length of the specified output information summary is 500 decimal digits.

[0097] The specific steps of information summarization based on scalable precision chaos are as follows:

[0098] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.

[0099] The input information is used as the initial parameters and control parameters of the Logistic mapping. Here, the ASCII code value (113) of the letter "q" is extracted. The initial parameters and control parameters of the Logistic mapping are respectively:

[0100] x 0 =0. 113 , a=3.9 113.

[0101] Set the number of Logistic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Hash algorithm based on extensible precision chaos in information security, which comprises the following steps of: 1) taking input information as an initial parameter and a control parameter based on an extensible precision logistic mapping, setting the chaotic mapping iterations and the precision of the obtained chaotic random sequence; 2) carrying out the chaotic iterative computation based on extensible precision, obtaining a chaotic random sequence and saving in a one-dimensional array; 3) setting the number of information bits required to be extracted and saving the information bit number pairs in the chaotic random sequence of the one-dimensional array for grouping; and 4) setting seeds, randomly siting and saving the seeds in the array. The Hash algorithm is established on the basis of extensible precision calculation chaos and fully utilizes the characteristic of chaos. The invention provides the novel and safe Hash algorithm satisfying the demands of different users. The Hash algorithm can be applied to the field of computer science using a Hash technology, including the technical fields of computer security, information security, cryptology, pattern matching, digital communication and the like.

Description

technical field [0001] The invention relates to a hash algorithm based on scalable precision chaos, which belongs to the field of computer science of hash technology. Background technique [0002] In the field of computer science, "Hash" is generally translated as "hash", and there are also direct transliterations into "hash", which is to transform an input of any length into a fixed-length output through a hash algorithm, and the output is the hash value. . For example, the widely used hash table. The hash table maps a group of keywords (key) to a limited address range according to the set hash function Hash(key), and uses the image of the keyword in the address range as the storage recorded in the table This table is called a hash table or a hash, and the resulting storage location is called a hash address or a hash address (Address). Can be expressed as: [0003] Address=Hash(key). [0004] Compared with tables and queues as a linear data structure, in theory, hash t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/15
Inventor 刘嘉辉张宏莉
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products