Chaotic-hash structuring method based composite non-linear digital wave-filter

A digital filter and construction method technology, applied in the field of information security, can solve the problems of destroying the global uniform distribution characteristics of PWL, the hash results are not uniformly distributed, and difficult to resist statistical attacks, and achieve easy expansion, software and hardware implementation, and simple implementation. Fast, resistant to the effects of linear analysis

Inactive Publication Date: 2006-08-09
SOUTHWEST JIAOTONG UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2003, Wang pointed out in Document 2 "Construction of One-way Hash Function Based on Generalized Chaotic Map Switching" (Wang Xiaomin et al. Acta Physica 2003 (52) 2737) that the algorithm is based on a specific chaotic system, which is easily deciphered by chaos prediction technology. At the same time, the effective word length precision effect will lead to the short-period behavior of the chaotic sequence, which will degrade the performance of the algorithm and other problems, and propose a chao

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic-hash structuring method based composite non-linear digital wave-filter
  • Chaotic-hash structuring method based composite non-linear digital wave-filter
  • Chaotic-hash structuring method based composite non-linear digital wave-filter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0026] The general method of the method for constructing a chaotic hash based on a composite nonlinear digital filter of the present invention is as follows:

[0027] 1) Initialization:

[0028] figure 1 Show: an n-dimensional nonlinear autoregressive digital filter can be expressed as

[0029] Where φ∈(-1,1) is the initial input signal of the filter, {z 1 ,z 2 ,…z n }∈(-1, 1) is the initial state of the filter, {c 1 , C 2 ,...C n } Is the filter coefficient, T is the unit delay, h(·) is the non-linear transfer function, mod(·) is the hardware overflow function, y is the output of the filter. When the filter satisfies the Kelber condition, that is, it satisfies the following three conditions: ①Coefficient c n ∈□, |c n |>1, {c i ∈R, c i ≠0|i=1,2,...n-1}; ②The absolute value of the characteristic root of the filter is not 1; ③The nonlinear transfor...

Embodiment 1

[0037] n=2-dimensional nonlinear digital filter, k=2 sets of coefficients pre-stored in the coefficient library, and a chaotic hash construction method under the condition that the hash length L=128.

[0038] 1) Initialization:

[0039] N-dimensional autoregressive nonlinear digital filter, n=2, p=1, parameter library pre-stored k=2 p =2 sets of coefficients {c 0 =[3.57, 4], c 1 =[5.7,7]}, the hash length L=128 bits, the initial value of the filter is the key SK={φ 0 ,z 1 ,z 2 }={φ 0 = 0.5648, z 1 = -0.564, z 2 =0.679}, the initial hash value H 0 = { 0 } 1 128 , Non-linear mapping h ( w ) = - 1 + 2 w / ...

Embodiment 2

[0052] n=3-dimensional nonlinear digital filter, k=4 sets of coefficients pre-stored in the coefficient library, and a chaotic hash construction method under the condition of L=256 hash length.

[0053] 1) Initialization:

[0054] n-dimensional autoregressive nonlinear digital filter, n=3, p=2, parameter library pre-stored k=2 p =4 sets of coefficients {c 0 =[2.53, -0.63, 2], c 1 =[5.1, 1.2, 5], c 2 =[-3.64, 4.23, 3], c 3 =[0.75, 3.24, 4]}, the hash length L=256 bits, the initial value of the filter is the key SK={φ 0 ,z 1 ,z 2 ,z 3 }={φ 0 = 0.5648, z 1 = -0.564, z 2 = 0.679, z 3 =0.132}, the initial hash value H 0 = { 0 } 1 256 , The non-linear mapping h(w), the quantization function T(x) output by the filter, and the hardware overflow function mod(·) are all the same as in the first embodiment. To simplify the length, we al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Under control of composite sequence generated by plaintext, sub system of autoregressive non-linear digital filter modulates plaintext to chaos locus in high dimension in composite filter. Hashed value of plaintext is produced by quantizing chaos locus in coarse granulation. Iterative initial point of composite filter is as cipher key of algorithm, which satisfies requirement of security of Hash algorithm with cipher key. Sensitivity and traversing characteristic on initial value of chaos in high dimension makes hashed result sense to plaintext exceedingly. Moreover, hashed result is distributed in hashed space evenly. The composite sequence increases randomness selected by sub system of filter so as to guarantee complex sensitive nonlinear relation between iterative locus and initial condition. Thus, the invention possesses better scrambling, and stronger capability for anti deciphering. Features are: simple and fast algorithm, easy of modularized realization.

Description

Technical field [0001] The invention relates to a hash construction method for extracting message digests in the technical field of information security, and can be widely used in security applications such as digital certificates, electronic signatures, password protection, and integrity verification of digital information. Background technique [0002] With the rapid development of e-commerce and information digitization, hashing algorithms are widely used in network-based security applications such as digital certificates, digital signatures, identity authentication, and information integrity protection. Classic hash algorithms such as MD5 (Message Digest 5, Message Digest Algorithm 5) and SHA (SecureHash Algorithm, Secure Hash Algorithm) have been widely used in e-commerce such as finance and securities and have become the two de facto standards. Since the 1990s, people have carried out security attacks on these two algorithms, and have successively proposed deciphering metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32
Inventor 张家树王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products