Method for constructing hash function with secret key based on chaotic neural network and enhanced iterative structure

A neural network and iterative structure technology, applied in the field of application cryptography, can solve problems such as security loopholes, and achieve the effect of improving security, improving collision resistance, and enhancing practicability

Pending Publication Date: 2022-04-29
SOUTHEAST UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These problems will lead to security vulnerabilities in protocols such as encryption and authentication based on hash algorithms such as MD5, SHA-0, SHA-1, and SHA-2.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing hash function with secret key based on chaotic neural network and enhanced iterative structure
  • Method for constructing hash function with secret key based on chaotic neural network and enhanced iterative structure
  • Method for constructing hash function with secret key based on chaotic neural network and enhanced iterative structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in detail below with reference to the accompanying drawings and embodiments.

[0053] Embodiment symbol description

[0054]

[0055] Such as figure 1 As shown, based on the construction method of the keyed hash function based on the chaotic neural network and the enhanced iterative structure, the hash function proposed by the present invention has 6 processing steps in total, wherein step S1 and step S2 are preprocessing stages, and plaintext filling and Plaintext encryption; Steps S3-S6 are the hash value generation stage of the hash function, performing data grouping, re-encryption, compression and iteration.

[0056] Such as figure 2 As shown, it is the data preprocessing stage of the present invention. The purpose of this stage is to fill and encrypt the plaintext for processing in subsequent steps, including step S1 and step S2; at this stage, first use the chaotic sequence to fill the plaintext data; filling method s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing a hash function with a secret key based on a chaotic neural network and an enhanced iterative structure. The method comprises the following steps of: coupling mapping grids to generate a chaotic sequence to fill a plaintext; the chaotic neural network serves as a compression function to process grouped data; the enhanced iterative structure processes each packet data to generate a hash value. The method has the beneficial effects that the capabilities of resisting intermediate meeting attacks, multi-collision attacks, length extension attacks and second primary image attacks aiming at long information of the hash function can be improved, so that the hash function has better collision resistance and mapping uniformity; the method can be applied to the password fields of digital signatures, key generation, hash-based message authentication codes, deterministic random bit generators and the like.

Description

[0001] Field [0002] The invention belongs to the field of applied cryptography, and in particular relates to a method for constructing a hash function with a key based on a chaotic neural network and an enhanced iterative structure. Background technique [0003] With the popularization of computers and the advent of the information age, people's lives are more and more closely integrated with the Internet. At the same time, various information security issues such as information leakage, tampering, and forgery have gradually aroused widespread concern in the society. Modern cryptography uses mathematical knowledge such as number theory, probability theory, and statistics, and involves subject knowledge such as information theory, computational complexity, and coding theory, providing a reliable guarantee for solving information security problems. Currently widely used cryptographic techniques include symmetric encryption algorithms, asymmetric encryption algorithms, hash fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06N3/04H04L9/00
CPCG06N3/0418H04L9/001H04L9/002
Inventor 陈立全朱宇航王宇卢雨晗胡致远
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products