首页> 外文会议>Computational intelligence for privacy and security >A Topological Study of Chaotic Iterations Application to Hash Functions
【24h】

A Topological Study of Chaotic Iterations Application to Hash Functions

机译:混沌迭代在哈希函数中的拓扑研究

获取原文
获取原文并翻译 | 示例

摘要

Chaotic iterations, a tool formerly used in distributed computing, has recently revealed various interesting properties of disorder leading to its use in the computer science security field. In this paper, a comprehensive study of its topological behavior is proposed. It is stated that, in addition to being chaotic as defined in the Devaney's formulation, this tool possesses the property of topological mixing. Additionally, its level of sensibility, expansivity, and topological entropy are evaluated. All of these properties lead to a complete unpredictable behavior for the chaotic iterations. As it only manipulates binary digits or integers, we show that it is possible to use it to produce truly chaotic computer programs. As an application example, a truly chaotic hash function is proposed in two versions. In the second version, an artificial neural network is used, which can be stated as chaotic according to Devaney.
机译:混沌迭代是以前在分布式计算中使用的一种工具,最近发现了无序的各种有趣特性,导致其在计算机科学安全领域中的使用。本文提出了对其拓扑行为的综合研究。据指出,除了像Devaney的公式所定义的那样混乱之外,该工具还具有拓扑混合的特性。此外,还评估了其敏感性,可扩展性和拓扑熵。所有这些特性导致混沌迭代具有完全不可预测的行为。由于它仅处理二进制数字或整数,因此我们证明可以使用它来生成真正混乱的计算机程序。作为一个应用示例,提出了两个版本的真正的混沌哈希函数。在第二个版本中,使用了人工神经网络,根据Devaney可以将其表示为混沌。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号