搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于复合非线性数字滤波器的Hash函数构造

王小敏 张家树 张文芳

引用本文:
Citation:

基于复合非线性数字滤波器的Hash函数构造

王小敏, 张家树, 张文芳

Keyed Hash function based on composite nonlinear autoregressive filter

Wang Xiao-Min, Zhang Jia-Shu, Zhang Wen-Fang
PDF
导出引用
  • 在对多个满足Kelber条件的滤波器组成的复合系统进行初步分析的基础上,提出了一个基于复合非线性数字滤波器的带密钥的Hash算法.算法首先构建能产生高维混沌序列的复合滤波器系统,然后在明文作用的复合序列控制下随机选择滤波器子系统,并以复合系统的初态作为密钥,以粗粒化的量化迭代轨迹作为明文的Hash值.讨论了复合系统实现Hash函数的不可逆性、防伪造性、初值敏感性等特点.研究结果表明:基于复合非线性数字滤波器的Hash算法简单快速,比基于单一混沌映射的Hash算法有着更高的安全性,同时滤波器结构中没有复杂的浮点运算,比一般复合混沌系统更易于软硬件实现.
    In recent years, chaotic dynamic systems are widely applied in information security because of its characteristic that the trajectory is sensitive to initial conditions and seems to be random though it is really a determinate process. The nonlinear autoregressive digital filters satisfying the Kelber conditions can also produce chaotic sequences just like chaotic maps do. The composite filter system consists of several above-mentioned filters, and the filter used for iteration is completely decided by a predetermined sequence called composite sequence. Consequently, the trajectory of the composite filter system is not only sensitive to its initial conditions, but also related with the composite sequence, which determines the choice of iterated sub-filter system in the iterating process. o the trajectory is more complex than that of general chaotic systems or single filter system. After analyzing some properties of composite filter systems such as N-dimensional uniform distribution and invariant distribution density function,a new keyed Hash algorithm based on composite system is presented. The approach selects the sub-filter system with the composite sequence obtained from message to be hashed, uses the initial iteration value of composite system as the secret key, and the coarse-grained trajectory as Hash value. Because of the sensitivity to initial value and randomicity of the iteration process, there is a very complex nonlinear relation between Hash value and the corresponding message and secret key, and then every bit of the Hash value derived from the message M is related with every bit of M. Furthermore, the filter-based algorithm is simple enough without complex operations, so it can be realized easily.
    • 基金项目: 国家自然科学基金(批准号:60272096)和四川省青年基金(批准号:03ZQ026-33,51430804Q72201)资助的课题.
计量
  • 文章访问数:  7020
  • PDF下载量:  1199
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-01-06
  • 修回日期:  2005-07-04
  • 刊出日期:  2005-06-05

/

返回文章
返回