Skip to main content

Hash Encryption Algorithm Structure Based on the Three-Dimensional Cat Mapping

  • Conference paper
  • First Online:
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 217))

Abstract

In order to effectively defense against plaintext, selective plaintext, and all kinds of attacks, this paper explored three-dimensional cat map and the chaotic system as a pseudo-random tool to generate the initial value. And after a number of iterations, we can remove part of the code into a 128-bit hash value, which can construct a hash encryption algorithm based on three-dimensional cat map. The proposed algorithm can increase the intensity of confidentiality, improve the resistance of the hash encryption algorithm on the types of attacks plaintext and selectively plaintext.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneier B (2001) Applied cryptography protocols, algorithms, and source code in C, vol 11. China Machine Press, China, pp 34–38

    Google Scholar 

  2. Xue-feng Z, Jiu-lun F (2007) A general cat map chaotic system and its performance analysis. J Syst Simul 23:19–28

    Google Scholar 

  3. Zhi-liang Z, Jing-ping S, Kun C, Hai Y (2010) Chaotic communication improvement program based on the cat mapping. J Northeastern Univ 9:31–36

    Google Scholar 

  4. Zai-guang M, Shuei-sheng Q (2003) An image encryption system based on general cat map. J China Inst Commun 2:24–27

    Google Scholar 

  5. Gui-ping H (2005) Color image encryption algorithm based on three-dimensional cat maping. J China Wuyi Univ 12:214–218

    Google Scholar 

  6. Yan Z, Xian-wu H, Jia-sheng L (2007) A image encryption algorithm based on the improved chaotic cat map. Comput Eng 10(33):37

    Google Scholar 

  7. Qiong Z, Min-fen S, Yi-kui Z (2007) The improvement of the image encryption algorithm based on 3D chaotic cat maps. Syst Eng Electron 9:45–49

    Google Scholar 

Download references

Acknowledgments

The work described in this paper was partially supported by the Applying Basic Research Program of Chongqing Education Committee (No. KJ110628, 09-2-020), Foundation Project of Chongqing Normal University (10XWQ20) and Excellent Talents Project of Chongqing Education Committee.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Yu, X. (2013). Hash Encryption Algorithm Structure Based on the Three-Dimensional Cat Mapping . In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 217. Springer, London. https://doi.org/10.1007/978-1-4471-4850-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4850-0_41

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4849-4

  • Online ISBN: 978-1-4471-4850-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics