A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map

2017 ◽  
Vol 27 (07) ◽  
pp. 1750106 ◽  
Author(s):  
Zhuosheng Lin ◽  
Simin Yu ◽  
Jinhu Lü

In this paper, a novel approach for constructing one-way hash function based on 8D hyperchaotic map is presented. First, two nominal matrices both with constant and variable parameters are adopted for designing 8D discrete-time hyperchaotic systems, respectively. Then each input plaintext message block is transformed into [Formula: see text] matrix following the order of left to right and top to bottom, which is used as a control matrix for the switch of the nominal matrix elements both with the constant parameters and with the variable parameters. Through this switching control, a new nominal matrix mixed with the constant and variable parameters is obtained for the 8D hyperchaotic map. Finally, the hash function is constructed with the multiple low 8-bit hyperchaotic system iterative outputs after being rounded down, and its secure analysis results are also given, validating the feasibility and reliability of the proposed approach. Compared with the existing schemes, the main feature of the proposed method is that it has a large number of key parameters with avalanche effect, resulting in the difficulty for estimating or predicting key parameters via various attacks.

Automatica ◽  
2014 ◽  
Vol 50 (11) ◽  
pp. 2835-2839 ◽  
Author(s):  
Behnam Allahverdi Charandabi ◽  
Horacio J. Marquez

2020 ◽  
Vol 30 (17) ◽  
pp. 7089-7102
Author(s):  
Carolina Albea Sanchez ◽  
Antonio Ventosa‐Cutillas ◽  
Alexandre Seuret ◽  
Francisco Gordillo

2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
F. J. Farsana ◽  
K. Gopakumar

With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. In this contest there is an increasing demand for successful storage of the data in the encrypted domain to avoid the possibility of data breach in shared networks. In this paper, a novel approach for speech encryption algorithm based on quantum chaotic system is designed. In the proposed method, classical bits of the speech samples are initially encoded in nonorthogonal quantum state by the secret polarizing angle. In the quantum domain, encoded speech samples are subjected to bit-flip operation according to the Controlled–NOT gate followed by Hadamard transform. Complete superposition of the quantum state in both Hadamard and standard basis is achieved through Hadamard transform. Control bits for C-NOT gate as well as Hadamard gate are generated with a modified Lu˙-hyperchaotic system. Secret nonorthogonal rotation angles and initial conditions of the hyperchaotic system are the keys used to ensure the security of the proposed algorithm. The computational complexity of the proposed algorithm has been analysed both in quantum domain and classical domain. Numerical simulation carried out based on the above principle showed that the proposed speech encryption algorithm has wider keyspace, higher key sensitivity and robust against various differential and statistical cryptographic attacks.


Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Abir Lassoued ◽  
Olfa Boubaker

A novel hyperchaotic system with fractional-order (FO) terms is designed. Its highly complex dynamics are investigated in terms of equilibrium points, Lyapunov spectrum, and attractor forms. It will be shown that the proposed system exhibits larger Lyapunov exponents than related hyperchaotic systems. Finally, to enhance its potential application, a related circuit is designed by using the MultiSIM Software. Simulation results verify the effectiveness of the suggested circuit.


1993 ◽  
Vol 47 (7) ◽  
pp. 973-981 ◽  
Author(s):  
Jiangbing Huang ◽  
Marek W. Urban

Reflection theory for step-wise stratified media is applied to establish the relationship between the reflectivity data obtained from ATR/FT-IR surface depth profiling experiments and the concentration at a given surface depth. In spite of the mathematical complexity of the process, an unknown surface depth profiling can be calculated by using a linear interpolation, or by applying a function with variable parameters. Due to limited assumptions and fairly reasonable computation time, even when the sample is finely divided to achieve high spatial resolution, the linear interpolation approach seems to be particularly advantageous. The proposed methodology is tested for the distribution of surfactant molecules and calculations of the surface depth profiles in latex thin films.


Sign in / Sign up

Export Citation Format

Share Document