Unlock instant, AI-driven research and patent intelligence for your innovation.
Hash algorithm based on extensible precision chaos
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of extended precision and information security, which is applied in the fields of pattern matching, computer science, digital communication, computer security, information security, and cryptography. and other issues to achieve the effect of convenient selection and reduction of conflicts
Inactive Publication Date: 2015-05-06
HARBIN INST OF TECH
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0015] 2. The chaotic system is extremely sensitive to the initial state, and a very small deviation of the initial condition will cause a great difference in the results; that is, the so-called "butterfly effect" - "a butterfly in the tropical rainforest of the Amazon River Basin in South America, Occasionally, a few flaps of its wings may cause a tornado in Texas, USA in two weeks”;
[0017] 4. Deterministic randomness, the dynamic behavior of the chaotic system is extremely complex, does not conform to the principles of probability and statistics, and is close to white noise; therefore, it is difficult to reconstruct and predict
Because the chaos calculated based on the finite precision of the computer is very different from the chaos on the continuous domain, that is, the value of the corresponding chaotic sequence obtained after digital quantization is difficult to accurately represent the real value of the calculated chaos. Therefore, in this paper The quantization error in refers to the calculation rounding error caused by the limited calculation precision of the computer, that is, due to the limited word length of the computer, in the process of numerical calculation, "rounding" or other calculation rules should be used for the intermediate result data obtained by calculation Approximate values, thus causing errors in the calculation process
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0059] Example 1: A hash table based on scalable precision chaos.
[0060] Here we assume that the input information is three numbers 123 (keywords), and the address space of the hash table is 0 to 20.
[0061] The specific steps to implement the hash table based on scalable precision chaos are as follows:
[0062] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.
[0063] The input information is used as the initial parameters and control parameters of the Logistic mapping, respectively:
[0064] x0=0. 123 , a=3.9 123 .
[0065] Set the number of Logistic mapping iterations equal to 2, and specify that the number of digits of the obtained random sequence is equal to 20.
[0066] (2) Extensible precision chaotic iteration is pe...
example 2
[0106] Example 2: Information summarization based on scalable precision chaos.
[0107]Here we assume that the input information is a letter "q", and the length of the specified output information summary is 500 decimal digits.
[0108] The specific steps of information summarization based on scalable precision chaos are as follows:
[0109] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.
[0110] The input information is used as the initial parameters and control parameters of the Logistic mapping. Here we extract the ASCII code value (113) of the letter "q". The initial parameters and control parameters of the Logistic mapping are:
[0111] x 0 =0. 113 , a=3.9 113 .
[0112] Set the number of Logistic mapping iterations equ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a Hash algorithm based on extensible precision chaos in information security, which comprises the following steps of: 1) taking input information as an initial parameter and a control parameter based on an extensible precision logistic mapping, setting the chaotic mapping iterations and the precision of the obtained chaotic random sequence; 2) carrying out the chaotic iterative computation based on extensible precision, obtaining a chaotic random sequence and saving in a one-dimensional array; 3) setting the number of information bits required to be extracted and saving the information bit number pairs in the chaotic random sequence of the one-dimensional array for grouping; and 4) setting seeds, randomly siting and saving the seeds in the array. The Hash algorithm is established on the basis of extensible precision calculation chaos and fully utilizes the characteristic of chaos. The invention provides the novel and safe Hash algorithm satisfying the demands of different users. The Hash algorithm can be applied to the field of computer science using a Hash technology, including the technical fields of computer security, information security, cryptology, pattern matching, digital communication and the like.
Description
technical field [0001] The invention relates to the field of computer science using hash technology, including computer security, information security, cryptography, pattern matching, digital communication and other technical fields. Background technique [0002] In the field of computer science, Hash, generally translated as "hash", is also directly transliterated as "hash", that is, the input of any length is transformed into a fixed-length output through the hash algorithm, and the output is the hash value . For example, the widely used hash table. The hash table maps a group of keywords (key) to a limited address range according to the set hash function Hash(key), and uses the image of the keyword in the address range as the storage recorded in the table This table is called a hash table or a hash, and the resulting storage location is called a hash address or a hash address (Address). Can be expressed as: [0003] Address=Hash(key). [0004] Compared with tables an...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.