Abstract
In order to effectively defense against plaintext, selective plaintext, and all kinds of attacks, this paper explored three-dimensional cat map and the chaotic system as a pseudo-random tool to generate the initial value. And after a number of iterations, we can remove part of the code into a 128-bit hash value, which can construct a hash encryption algorithm based on three-dimensional cat map. The proposed algorithm can increase the intensity of confidentiality, improve the resistance of the hash encryption algorithm on the types of attacks plaintext and selectively plaintext.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schneier B (2001) Applied cryptography protocols, algorithms, and source code in C, vol 11. China Machine Press, China, pp 34–38
Xue-feng Z, Jiu-lun F (2007) A general cat map chaotic system and its performance analysis. J Syst Simul 23:19–28
Zhi-liang Z, Jing-ping S, Kun C, Hai Y (2010) Chaotic communication improvement program based on the cat mapping. J Northeastern Univ 9:31–36
Zai-guang M, Shuei-sheng Q (2003) An image encryption system based on general cat map. J China Inst Commun 2:24–27
Gui-ping H (2005) Color image encryption algorithm based on three-dimensional cat maping. J China Wuyi Univ 12:214–218
Yan Z, Xian-wu H, Jia-sheng L (2007) A image encryption algorithm based on the improved chaotic cat map. Comput Eng 10(33):37
Qiong Z, Min-fen S, Yi-kui Z (2007) The improvement of the image encryption algorithm based on 3D chaotic cat maps. Syst Eng Electron 9:45–49
Acknowledgments
The work described in this paper was partially supported by the Applying Basic Research Program of Chongqing Education Committee (No. KJ110628, 09-2-020), Foundation Project of Chongqing Normal University (10XWQ20) and Excellent Talents Project of Chongqing Education Committee.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Yu, X. (2013). Hash Encryption Algorithm Structure Based on the Three-Dimensional Cat Mapping . In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 217. Springer, London. https://doi.org/10.1007/978-1-4471-4850-0_41
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4850-0_41
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4849-4
Online ISBN: 978-1-4471-4850-0
eBook Packages: EngineeringEngineering (R0)