高级检索
    刘建东. 基于整数耦合帐篷映射的单向Hash函数及其性能分析[J]. 计算机研究与发展, 2008, 45(3): 563-569.
    引用本文: 刘建东. 基于整数耦合帐篷映射的单向Hash函数及其性能分析[J]. 计算机研究与发展, 2008, 45(3): 563-569.
    Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.
    Citation: Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

    基于整数耦合帐篷映射的单向Hash函数及其性能分析

    One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis

    • 摘要: 提出一种基于整数耦合帐篷映射的单向Hash函数,并对其特性进行了分析.提出的算法采用双向耦合映像格子模型,用整数帐篷映射取代了传统的逻辑函数,具有较为理想的混淆与扩散特性.应用该算法,可将任意长度的明文序列单向散列为160比特Hash值.实验与分析结果表明,这种Hash函数具有很好的单向性、抗碰撞性,满足单向Hash函数的各项性能要求.该算法全部采用有限整数集内的简单位操作完成,便于软硬件实现,并且有高的执行效率.

       

      Abstract: A one-way hashing algorithm is a deterministic algorithm that compresses an arbitrary long message into a value of specified length. The output value represents the fingerprint or digest of the message. In this paper, A novel integer coupled tent maps-based cryptographic one-way hash function is put forward and an analysis on its characteristics is carried out. In the algorithm, the two-way coupled map lattice model is adopted, and the traditional logic functions are replaced with the integer tent map, so that it has ideal diffusion and confusion properties. The Hash value of 160 bits is obtained from a message with arbitrary length by means of the nonlinear transform on the coupled iteration integer sequences. Aanalysis and simulation results indicate that the algorithm has good one-way and collision resistant performances,which satisfy all kinds of functional requirements of one-way Hash. The Hash function all adopts simple integer operation, so that it could be easily realized both in software and hardwareand high implementation efficiency could be realized. The integer coupled tent maps-based Hash function serves as one of the most highly competitive candidates for practical applications of Hash function and secure information communications in computer networks.

       

    /

    返回文章
    返回