A One-way Hash Function Construction Method Based on Chaotic Dynamics Theory
A construction method and chaotic technology, applied in the field of information security, can solve problems such as lack of security features
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0065] In the present embodiment, the oversaturated Hopfield neural network has 16 neurons, introduces a random transformation matrix H, and the original state S u and the evolution of the matrix S composed of elements in the attraction domain follows the following rules:
[0066]
[0067]
[0068] is the updated state of S, is S u update status of .
[0069] Let the initial connection matrix T of the OHNN network 0 for:
[0070]
[0071] The selected N-order non-singular random transformation matrix H is:
[0072]
[0073] Compute the new weight connection matrix of the neural network
[0074]
[0075] where T 0 Is the connection weight matrix and is a singular square matrix, H is the rotation matrix; H' is the transposition matrix of H. After the network is running, for The generated attractor set is shown in Table 1 after calculation.
[0076] Table 1 attractor set
[0077]
[0078]
[0079] The attractor elements in the convergence doma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


