• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
Citation: WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155

A Hash Function Algorithm Based on Variable Parameter Cascade Chaos

More Information
  • Published Date: February 29, 2016
  • A Hash function algorithm based on variable parameter cascade chaos is put forward aiming at the possible risk on the letting out of cascade chaos key and the deficiency of present Hash function. That is the status variable of another chaos system as the parameter perturbation is introduced to a Hash function cascade driving system, and the safe variable parameter cascade chaos system is realized with the control of turbulence intensity. The Hash function composed in this way not only obeys the variable parameter characteristic of chaos rules, but also possesses the feature of crosstalk step by step between the cascade subsystems. It can effectively reduce the risk of short period behavior caused by the finite computer precision and digital quantization possible, and it has great significance to improve the complexity and strong collision resistance of the compression function’s internal structure. The experimental results show that compared with other chaotic Hash algorithm and SHA-3 algorithm, this algorithm has high sensitivity to initial conditions, nice chaos and diffusion ability, strong collision resistance, simple and flexible algorithm, and strong controllability of variable parameter system; and it has a favorable prospect in the field of chaos secure communication, digital signature, etc.
  • Related Articles

    [1]Zhang Zhongya, Wu Wenling, Zou Jian. Quantum Differential Collision Key Recovery Attack of Multi-Round EM Structure[J]. Journal of Computer Research and Development, 2021, 58(12): 2811-2818. DOI: 10.7544/issn1000-1239.2021.20200427
    [2]Shu Xin, Tang Hui, Yang Xibei, Song Xiaoning, Wu Xiaojun. Research on Face Anti-Spoofing Algorithm Based on DQ_LBP[J]. Journal of Computer Research and Development, 2020, 57(7): 1508-1521. DOI: 10.7544/issn1000-1239.2020.20190319
    [3]Tian Ye, Xiang Shijun. LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection[J]. Journal of Computer Research and Development, 2018, 55(3): 643-650. DOI: 10.7544/issn1000-1239.2018.20160417
    [4]Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin. A Kind of New Anti-Collision Approach Based on AID[J]. Journal of Computer Research and Development, 2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560
    [5]Ma Bingke, Li Bao. Collision and Second Preimage Attacks on the HTBC Hash Function[J]. Journal of Computer Research and Development, 2014, 51(11): 2513-2517. DOI: 10.7544/issn1000-1239.2014.20130882
    [6]Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457.
    [7]Wu Haifeng, Zeng Yu, and Feng Jihua. Passive RFID Tag Anti-Collision Binary Tree Slotted Protocol without Tags Quantity Estimation[J]. Journal of Computer Research and Development, 2012, 49(9): 1959-1971.
    [8]Zhou Huan, Xu Shouzhi, and Li Chengxia. A V2V Broadcast Protocol for Chain Collision Avoidance on Highways[J]. Journal of Computer Research and Development, 2009, 46(12): 2062-2067.
    [9]Liu Li, Wang Zhaoqi, Xia Shihong, Li Chunpeng. Research on Directional Penetration Depth Algorithm in Collision Response[J]. Journal of Computer Research and Development, 2008, 45(3): 519-526.
    [10]Su Xiaohong, Zhang Mingjie, Ma Peijun, and Wang Yadong. Research on Solving the Problem of CMAC Neural Network Collision[J]. Journal of Computer Research and Development, 2006, 43(5): 862-866.

Catalog

    Article views (1203) PDF downloads (672) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return