Implementation of Hash Function Based On Neural Cryptography

نویسندگان

  • Vineeta Soni
  • Sarvesh Tanwar
چکیده

In this paper a new hash function is constructed based on multilayer feed forward network with piecewise linear chaotic map. Chaos has been used in data protection because of the features of initial value sensitivity, random similarity and ergodicity. We have used three neuronal layers to prove confusion, diffusion and compression respectively. This hash function takes input of arbitrary length and generate a fixed length hash value.(128 bit, 256 bit or 512 bit). By performance analysis and results we have shown that generated hash function is one way, collision resistant and secure against birthday attacks and man in middle attacks. Keywords—Neural Network, Cryptography, Tree parity machines, Piecewise linear chaotic map, hash function, plain text sensitivity, data signature

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

متن کامل

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

Framework For Wireless Network Security Using Hash Function Based On Feed Forward Artificial Neural Network

Every time computer user asked to keep secret their passwords for various purposes. But memorization of all the passwords always is a tedious job. In this paper, we construct a Hash Function based on Feed Forward Neural Network. Hash Function is one way and secure against Man-in-the-Middle attack. Wired Equivalent Privacy is a well known Wireless Protocol used by every wireless communication us...

متن کامل

A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation

One way hash functions are an important tool in achieving authentication and data integrity The aim of this paper is to propose a novel one way hash function based on cellular automata whose cryp tographic properties have been extensively studied over the past decade or so Furthermore security of the proposed one way hash function is analyzed by the use of very recently published results on app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014