搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于非线性级联傅里叶变换的光学Hash函数构造

何文奇 彭翔 祁永坤 孟祥锋 秦琬 高志

引用本文:
Citation:

基于非线性级联傅里叶变换的光学Hash函数构造

何文奇, 彭翔, 祁永坤, 孟祥锋, 秦琬, 高志

Construction of optical Hash function based on nonlinear cascaded Fourier transform

He Wen-Qi, Peng Xiang, Qi Yong-Kun, Meng Xiang-Feng, Qin Wan, Bruce Z. Gao
PDF
导出引用
  • 提出一种基于非线性级联傅里叶变换的光学Hash函数的构造方法.此方法分为两轮单向加密过程,在第一轮中,先将待处理的数字信息以512 bit作为数据块编码,将整个数字信息整分成若干个“8×8的256阶灰度图像”(信息平面),然后在光电混合系统中对上述信息平面组做非线性级联傅里叶变换得到一个数值矩阵,对其进行扩展后得到4个信息平面,再对它们做非线性级联傅里叶变换得到64 bit的Hash值(hash1);在第二轮中,先将原始信息平面中的每个数值循环左移4位,构造出相应的辅助信息平面组,然
    A method of constructing optical Hash function based on nonlinear cascaded Fourier transform is proposed. The proposed method consists of two single one-way encryption processes. In the first process, the digital information is divided to several data blocks with 512-bit each. The data blocks are encoded to 8 by 8 sub-images with 256 gray scales, creating information planes. Then take a nonlinear cascaded Fourier transform of sub-image to generate a data matrix through an optical/digital hybrid system. By extending the data matrix we get four information planes. Again, taking nonlinear cascaded Fourier transform to built information planes, we get a Hash value 64-bit long (hash1). In the second process, we shift cydically every numerical value of the original information planes by 4-bit, constructing auxiliary information planes. Thereafter we take the same operations as we have done in the first process to the Hash value (hash2). Once hash1 and hash2 obtained, they are combined to form a final Hash value 128-bit long (hash). Furthermore, the avalanche effect coefficient (AEC) was also proposed to evaluate the performance of the optical Hash function. Theoretical analysis and simulation results are presented to show the effectiveness of optical Hash function constructed by our approach and the constructed optical Hash function has good performance of avalanche effect and collision resistance.
    • 基金项目: 国家自然科学基金(批准号:60907005,60775021),中科院微系统与信息技术研究所项目和中国博士后科学基金(批准号:200902334)资助的课题.
    [1]

    [1]Tsudik G 1992 Comput. Commun. Rev. 22 29

    [2]

    [2]Yang Y G 2008 Chin. Phys. B 17 415

    [3]

    [3]Schneier B 1996 Applied Cryptography, second edition (John Wiley & Sons) p122—177

    [4]

    [4]Shimon E, Goldreich O, Micali S 1996 J. Cryptology 9 35

    [5]

    [5]Hu X D, Wei Q F 2005 Applied Cryptography tutorial (Beijing: Electronics industry Press) p122—177 (in Chinese)[胡向东、魏琴芳 应用密码学教程 2005 (北京:电子工业出版社) 第122页—177页]

    [6]

    [6]Rivest R L 1991 Lect. Notes. Comput. Sc. 537 303

    [7]

    [7]Rivest R L 1992 RFC 1321, MIT and RSA Data Security, Inc

    [8]

    [8]Wang X Y, Yu H B 2005 Lect. Notes. Comput. Sc. 3494 19

    [9]

    [9]Wang X Y, Yin Y L, Yu H B 2005 Lect. Notes. Comput. Sc. 3621 17

    [10]

    ]Lin Q Q, Wang F Q, Mi J L, Liang R S, Liu S H 2007 Acta. Phys. Sin. 56 5796 (in Chinese)[林青群、王发强、米景隆、梁瑞生、刘颂豪 2007 物理学报 56 5796]

    [11]

    ]Cai J M, Liu D, Chen T M 2007 Comput. Appl. 27 219 (in Chinese)[蔡家楣、刘多、陈铁明 2007 计算机应用 27 219]

    [12]

    ]Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [13]

    ]Liu G J, Shan L, Dai Y W, Sun J S, Wang Z Q 2006 Acta. Phys. Sin. 55 5688 (in Chinese)[刘光杰、单梁、戴跃伟、孙金生、王执铨 2006 物理学报 55 5688]

    [14]

    ]Wang J Z, Wang Y L, Wang M Q 2006 Acta. Phys. Sin. 55 5048 (in Chinese)[王继志、王应龙、王美琴 2006 物理学报 55 5048]

    [15]

    ]Peng X, Wei H Z, Zhang P 2006 Opt. Lett. 31 3579

    [16]

    ]Yuan S, Zhou X, Alam M S, Lu X, Li X F 2009 Opt. Express 17 3270

    [17]

    ]Peng X, Yu L F, Cai L L 2002 Opt. Express 10 41

    [18]

    ]Peng X, Tang H Q, Tian J D 2007 Acta. Phys. Sin. 56 2629 (in Chinese)[彭翔、汤红乔、田劲东 2007 物理学报 56 2629]

    [19]

    ]Yi X 2005 IEEE T. Circuits. Syst. 52 354

  • [1]

    [1]Tsudik G 1992 Comput. Commun. Rev. 22 29

    [2]

    [2]Yang Y G 2008 Chin. Phys. B 17 415

    [3]

    [3]Schneier B 1996 Applied Cryptography, second edition (John Wiley & Sons) p122—177

    [4]

    [4]Shimon E, Goldreich O, Micali S 1996 J. Cryptology 9 35

    [5]

    [5]Hu X D, Wei Q F 2005 Applied Cryptography tutorial (Beijing: Electronics industry Press) p122—177 (in Chinese)[胡向东、魏琴芳 应用密码学教程 2005 (北京:电子工业出版社) 第122页—177页]

    [6]

    [6]Rivest R L 1991 Lect. Notes. Comput. Sc. 537 303

    [7]

    [7]Rivest R L 1992 RFC 1321, MIT and RSA Data Security, Inc

    [8]

    [8]Wang X Y, Yu H B 2005 Lect. Notes. Comput. Sc. 3494 19

    [9]

    [9]Wang X Y, Yin Y L, Yu H B 2005 Lect. Notes. Comput. Sc. 3621 17

    [10]

    ]Lin Q Q, Wang F Q, Mi J L, Liang R S, Liu S H 2007 Acta. Phys. Sin. 56 5796 (in Chinese)[林青群、王发强、米景隆、梁瑞生、刘颂豪 2007 物理学报 56 5796]

    [11]

    ]Cai J M, Liu D, Chen T M 2007 Comput. Appl. 27 219 (in Chinese)[蔡家楣、刘多、陈铁明 2007 计算机应用 27 219]

    [12]

    ]Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [13]

    ]Liu G J, Shan L, Dai Y W, Sun J S, Wang Z Q 2006 Acta. Phys. Sin. 55 5688 (in Chinese)[刘光杰、单梁、戴跃伟、孙金生、王执铨 2006 物理学报 55 5688]

    [14]

    ]Wang J Z, Wang Y L, Wang M Q 2006 Acta. Phys. Sin. 55 5048 (in Chinese)[王继志、王应龙、王美琴 2006 物理学报 55 5048]

    [15]

    ]Peng X, Wei H Z, Zhang P 2006 Opt. Lett. 31 3579

    [16]

    ]Yuan S, Zhou X, Alam M S, Lu X, Li X F 2009 Opt. Express 17 3270

    [17]

    ]Peng X, Yu L F, Cai L L 2002 Opt. Express 10 41

    [18]

    ]Peng X, Tang H Q, Tian J D 2007 Acta. Phys. Sin. 56 2629 (in Chinese)[彭翔、汤红乔、田劲东 2007 物理学报 56 2629]

    [19]

    ]Yi X 2005 IEEE T. Circuits. Syst. 52 354

计量
  • 文章访问数:  7083
  • PDF下载量:  1041
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-05-07
  • 修回日期:  2009-06-09
  • 刊出日期:  2010-03-15

/

返回文章
返回