Abstract
How to design an efficient and security keyed hash function is always the point in modern cryptography researches. In this paper, A better chaos sequence is generated by RBF neural network through training the known chaotic sequence generated by a piecewise nonlinear map, then the sequence is used to construct keyed hash function. One advantage of the algorithm is that the hidden-mapping model of neural network makes it difficult to get the direct mapping function of the ordinary chaos hash algorithm. Simulation results show that the keyed hash function based on the neural network has good one-way, weak collision, better security property and it can be realized easily.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography, 3rd edn. China Machine Press, Beijing (2001)
Pieprzyh, J.: Design of Hashing Algorithm. Springer, Heidelberg (1993)
Xiaomin, W., Jianhu, Z., Wenfang, Z.: One Way Hash Function Construction Based on the Extended Chaotic Maps Switch. Acta Physica Sinica 52(6), 273–275 (2003)
Junning, L., Jiecheng, X., Pu, W.: One Way Hash Function Construction Based on Chaotic Mappings. J Tsinghua Univ. 40(3), 55–58 (2000)
Hongda, L., Dengguo, F.: Composite Nonlinear Discrete Chaotic Dynamical Systems and Keyed Hash Functions. Chinese Journal of Computers 26(5), 460–465 (2003)
Tao, S., Ruli, W., Yixun, Y.: Generating Binary Bernoulli Sequences Based on a Class of Even-Symmetric Chaotic Maps. IEEE Tran. Communications 49(8), 620–623 (2001)
Guojie, H., Zhengjin, F.: Theoretical Design for a Class of New Chaotic Stream Cipher. Communications Technology 24(4), 73–74 (2003)
Di, X., Xiaofeng, L.: A Combined Hash and Encryption Scheme by Chaotic Neural Network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 633–638. Springer, Heidelberg (2004)
Di, X., Xiaofeng, L., Guoping, T., Chuandong, L.: Using Chebyshev Chaotic Map to Construct Infinite Length Hash Chains. In: 2004 International Conference on Communications Circuits and Systems, pp. 11–12 (2004)
Kwok-Wo, W.: A Combined Chaotic Cryptographic and Hashing Scheme. Physics Letters A 307(10), 292–298 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wei, P., Zhang, W., Yang, H., Chen, J. (2006). Combining RBF Neural Network and Chaotic Map to Construct Hash Function. In: Wang, J., Yi, Z., Zurada, J.M., Lu, BL., Yin, H. (eds) Advances in Neural Networks - ISNN 2006. ISNN 2006. Lecture Notes in Computer Science, vol 3973. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760191_49
Download citation
DOI: https://doi.org/10.1007/11760191_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34482-7
Online ISBN: 978-3-540-34483-4
eBook Packages: Computer ScienceComputer Science (R0)