HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult. The proposed algorithm consists of the stages: selection of the variables and o...
Gespeichert in:
Veröffentlicht in: | Sistemnyĭ analiz i prikladnai͡a︡ informatika. 2017-08 (2), p.54-60 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult. The proposed algorithm consists of the stages: selection of the variables and of the parameters of two-dimensional chaotic mappings; realization of iterations of the chaotic mappings with the addition of the original-message elements to the variables; realization of iterations of the chaotic mappings without the addition of the original-message elements to the variables; the hash-value formation. The formation of the two hash-values h
1
and h
2
realized with different orders of the variables. The resultant hash-value is obtained by the modulo-2 addition operation applied to the hash-values h
1
and h
2
. The proposed algorithm has been tested. It has been found that this algorithm is characterized by the avalanche effect. The statistical characteristics of the sequence formed of hash-values are identical to those of the sequence with the randomly obtained values of the elements, pointing to the adequate performance of this algorithm. The computational experiment has been realized using the Chirikov, «Arnold’s cat» and Henon maps. It is demonstrated that, with the use of Henon and «Arnold’s cat» maps for the messages exceeding 4 KB, the proposed algorithm outperforms «Keccak» algorithm, being faster by 20% and more.
The proposed hashing algorithm may be used in solving the problems of data integrity in modern telecommunication systems. |
---|---|
ISSN: | 2309-4923 2414-0481 |
DOI: | 10.21122/2309-4923-2017-2-54-60 |