浏览全部资源
扫码关注微信
1. 中国科学院 长春光学精密机械与物理研究所 应用光学国家重点实验室,吉林 长春,130033
2. 中国科学院 研究生院 北京,100039
3. 南开大学 信息技术科学学院 天津,300071
收稿日期:2010-05-10,
修回日期:2010-07-26,
网络出版日期:2010-09-29,
纸质出版日期:2010-09-20
移动端阅览
李佩玥, 古力, 隋永新, 杨怀江. 基于轨道扰动的混沌单向散列函数设计[J]. 光学精密工程, 2010,18(9): 2101-2108
LI Pei-yue, GU Li, SUI Yong-xin, YANG Huai-jiang. Design of chaotic one-way hash function based on orbit perturbation[J]. 光学精密工程, 2010,18(9): 2101-2108
李佩玥, 古力, 隋永新, 杨怀江. 基于轨道扰动的混沌单向散列函数设计[J]. 光学精密工程, 2010,18(9): 2101-2108 DOI: 10.3788/OPE.20101809.2101.
LI Pei-yue, GU Li, SUI Yong-xin, YANG Huai-jiang. Design of chaotic one-way hash function based on orbit perturbation[J]. 光学精密工程, 2010,18(9): 2101-2108 DOI: 10.3788/OPE.20101809.2101.
在分析针对数字混沌提出的伪随机扰动策略和变参数补偿策略的基础上
提出了基于轨道扰动的混沌单向散列函数设计方法。首先
将消息填充为64 byte的整数倍
以提高短消息散列的安全性;然后
选取64 byte的固定扰动向量
并将明文信息与固定扰动向量一起映射至数字混沌系统相空间的扰动空间;最后
将扰动空间内的元素输入至数字混沌系统进行多次混沌迭代
并在迭代结果中取出160 bit作为最终散列值。该算法选用Logistic映射作为混沌映射
计算复杂度比高维混沌映射低
而轨道扰动的思想使得该算法比一般的低维混沌映射安全性更高。研究表明
该算法对初值极其敏感
且具有很好的混乱和扩散性质及较高的抗碰撞性。该算法采用256 bit定点数运算
更易于软硬件实现。
On the basis of analysis on the pseudo-random perturbation policy and Variable Parameter Compensation(VPCM) policy for digital chaotic system
a method to design the chaotic one-way hash function based on the orbit perturbation is proposed. In order to improve the security of short message hashing
the message is padded to be a multiple of 64 byte. Then
the length fixed perturbation of 64 bytes length is chosen
and the perturbation together with the padded message are mapped to the perturbation space of digital chaotic system.Finally
the digital chaotic system is iterated multiple times by using the elements of the perturbation space as inputs
and a hash value with 160 bit length is extracted from the results. The proposed algorithm uses the logistic mapping as the chaotic mapping
of which the computational complexity is lower than the one that has a reasonable high dimension. As the orbit perturbation is introduced the algorithm
its security is higher than that of common one. The results indicate that the algorithm is sensitive to the initial message comparatively and shows good confusion and diffusion properties. Moreover
the fix-point operations with 256 bits are used in the proposed algorithm
and it is easy to be completed by software or hardware.
樊春霞,姜长生. 一种基于混沌映射的图像加密算法
. 光学 精密工程, 2004,12(2):179-184. FAN CH X, JIANG CH SH. Image encryption based on discrete chaotic maps
. Opt. Precision Eng., 2004,12(2):179-184. (in Chinese)
黄峰,冯勇. 利用图像分割思想的二维混沌映射及图像加密算法
. 光学 精密工程, 2007,15(7):1096- 1103. HUANG F, FENG Y. Novel 2D chaotic map based on image segmentation and image encryption approach
. Opt. Precision Eng., 2007,15(7):1096- 1103. (in Chinese)
李娟,冯勇,杨旭强,等. 三维可逆混沌映射图像加密及其优化算法
. 光学 精密工程,2008,16(9):1738-1745. LI J, FENG Y, YANG X Q, et al.. Invertible chaotic 3D map based image encryption and its optimized algorithm
. Opt. Precision Eng., 2008,16(9):1738-1745. (in Chinese)
刘军宁,谢杰成,王普. 基于混沌映射的单向Hash函数构造
. 清华大学学报(自然科学版),2000,40(7):55-58. LIU J N, XIE J CH, WANG P. One way hash function construction based on chaotic mappings
. Journal of Tsinghua University (Sci & Tech), 2000,40(7):55-58. (in Chinese)
郭伟,曹杨,王小敏,等. 基于混沌动态参数的散列函数
. 通信学报, 2008,10(29):93-100. GUO W, CAO Y, WANG X M, et al.. One-way hash function with chaotic dynamic parameters
. Journal on Communications, 2008,10(29):93-100.(in Chinese)
姜楠,杨德礼,王德高. 基于混沌理论的身份认证方案
. 吉林大学学报(理学版),2008,46(7):711-715. JIANG N, YANG D L, WANG D G. Identity authentication scheme based on chaotic theory
. Journal of Jilin University (Science Edition), 2008,46(7):711-715.(in Chinese)
XIAO D, LIAO X F, WANG Y. Parallel keyed hash function construction based on chaotic neural network
. Neurocomputing, 2009,72:2288-2296.
AMIN M, FARAGALLAH O S, EL-LATIF A A A. Chaos-based hash function (CBHF) for cryptographic applications
. Chaos, Solitons and Fractals, 2009,42:767-772.
任海鹏,庄元. 基于超混沌Chen系统和密钥流构造单向散列函数的方法
. 通信学报, 2009,30(10):100-113. REN H P, ZHUANG Y. One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
. Journal on Communications, 2009,30(10):100-113.(in Chinese)
王继志,王英龙,王美琴. 一类基于混沌映射构造Hash函数方法的碰撞缺陷
. 物理学报, 2006,55(10):5049-5054. WANG J ZH, WANG Y L, WANG M Q. The collision problem of one kind of methods for constructing one-way hash function based on chaotic map
. Acta Physica Sinica, 2006,55(10):5049-5054. (in Chinese)
王小敏.非线性动力学滤波器设计及其在信息安全中的应用研究 . 成都:西南交通大学,2007. WANG X M. Design of nonlinear dynamic filter and its application in information security .Chengdu: Southwest Jiaotong University, 2007.(in Chinese)
LI S J. Analyses and new designs of digital chaotic ciphers . Xian: Xian Jiaotong University, 2003.
周红,凌夑亭. 有限精度混沌系统的m序列扰动实现
. 电子学报, 1997,25(7):95-97. ZHOU H, LING X T. Realizing finite precision chaotic systems via perturbation of m-sequences
. Acta Electronica Sinica, 1997,25(7):95-97. (in Chinese)
CERMAK J. Digital generators of chaos
. Phys. Lett. A, 1996,214(3-4):151-160.
SANG T, WANG R L, YAN Y X. Perturbance-based algorithm to expand cycle length of chaotic key stream
. Electronics Letters, 1998,34(9):873-874.
SANG T, WANG R L, YAN Y X. Clock-controlled chaotic keystream generators
. Electronics Letters, 1998,34(20):1932-1934.
HU H P, XU Y, ZHU Z Q. A method of improving the properties of digital chaotic system
. Chaos Solitons & Fractals, 2008,38:439-446.
0
浏览量
381
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构