Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hash algorithm based on extensible precision chaos

A technology of extended precision and information security, which is applied in the fields of pattern matching, computer science, digital communication, computer security, information security, and cryptography. and other issues to achieve the effect of convenient selection and reduction of conflicts

Inactive Publication Date: 2015-05-06
HARBIN INST OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] 2. The chaotic system is extremely sensitive to the initial state, and a very small deviation of the initial condition will cause a great difference in the results; that is, the so-called "butterfly effect" - "a butterfly in the tropical rainforest of the Amazon River Basin in South America, Occasionally, a few flaps of its wings may cause a tornado in Texas, USA in two weeks”;
[0017] 4. Deterministic randomness, the dynamic behavior of the chaotic system is extremely complex, does not conform to the principles of probability and statistics, and is close to white noise; therefore, it is difficult to reconstruct and predict
Because the chaos calculated based on the finite precision of the computer is very different from the chaos on the continuous domain, that is, the value of the corresponding chaotic sequence obtained after digital quantization is difficult to accurately represent the real value of the calculated chaos. Therefore, in this paper The quantization error in refers to the calculation rounding error caused by the limited calculation precision of the computer, that is, due to the limited word length of the computer, in the process of numerical calculation, "rounding" or other calculation rules should be used for the intermediate result data obtained by calculation Approximate values, thus causing errors in the calculation process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash algorithm based on extensible precision chaos
  • Hash algorithm based on extensible precision chaos
  • Hash algorithm based on extensible precision chaos

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0059] Example 1: A hash table based on scalable precision chaos.

[0060] Here we assume that the input information is three numbers 123 (keywords), and the address space of the hash table is 0 to 20.

[0061] The specific steps to implement the hash table based on scalable precision chaos are as follows:

[0062] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.

[0063] The input information is used as the initial parameters and control parameters of the Logistic mapping, respectively:

[0064] x0=0. 123 , a=3.9 123 .

[0065] Set the number of Logistic mapping iterations equal to 2, and specify that the number of digits of the obtained random sequence is equal to 20.

[0066] (2) Extensible precision chaotic iteration is pe...

example 2

[0106] Example 2: Information summarization based on scalable precision chaos.

[0107]Here we assume that the input information is a letter "q", and the length of the specified output information summary is 500 decimal digits.

[0108] The specific steps of information summarization based on scalable precision chaos are as follows:

[0109] (1) The input information is used as the initial parameters and control parameters based on the scalable precision Logistic mapping, and the number of iterations of the Logistic mapping and the number of digits (precision) of the random sequence obtained by specifying the Logistic mapping are set.

[0110] The input information is used as the initial parameters and control parameters of the Logistic mapping. Here we extract the ASCII code value (113) of the letter "q". The initial parameters and control parameters of the Logistic mapping are:

[0111] x 0 =0. 113 , a=3.9 113 .

[0112] Set the number of Logistic mapping iterations equ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Hash algorithm based on extensible precision chaos in information security, which comprises the following steps of: 1) taking input information as an initial parameter and a control parameter based on an extensible precision logistic mapping, setting the chaotic mapping iterations and the precision of the obtained chaotic random sequence; 2) carrying out the chaotic iterative computation based on extensible precision, obtaining a chaotic random sequence and saving in a one-dimensional array; 3) setting the number of information bits required to be extracted and saving the information bit number pairs in the chaotic random sequence of the one-dimensional array for grouping; and 4) setting seeds, randomly siting and saving the seeds in the array. The Hash algorithm is established on the basis of extensible precision calculation chaos and fully utilizes the characteristic of chaos. The invention provides the novel and safe Hash algorithm satisfying the demands of different users. The Hash algorithm can be applied to the field of computer science using a Hash technology, including the technical fields of computer security, information security, cryptology, pattern matching, digital communication and the like.

Description

technical field [0001] The invention relates to the field of computer science using hash technology, including computer security, information security, cryptography, pattern matching, digital communication and other technical fields. Background technique [0002] In the field of computer science, Hash, generally translated as "hash", is also directly transliterated as "hash", that is, the input of any length is transformed into a fixed-length output through the hash algorithm, and the output is the hash value . For example, the widely used hash table. The hash table maps a group of keywords (key) to a limited address range according to the set hash function Hash(key), and uses the image of the keyword in the address range as the storage recorded in the table This table is called a hash table or a hash, and the resulting storage location is called a hash address or a hash address (Address). Can be expressed as: [0003] Address=Hash(key). [0004] Compared with tables an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/15
Inventor 刘嘉辉张宏莉
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products