Hash Function Construction Based on RBFNN and Chaotic Mapping

Full Text (PDF, 278KB), PP.1-9

Views: 0 Downloads: 0


Jun Chen 1,* Chunxiao He 2 Pengcheng Wei 3

1. Dean’s Office Chongqing Education College Chongqing 400067, China

2. Teaching and Research Section of Computer Chongqing Education Management School Chongqing 400066, China

3. Department of Computer Science Chongqing Education College Chongqing 400067, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijem.2011.04.01

Received: 5 May 2011 / Revised: 16 Jun. 2011 / Accepted: 21 Jul. 2011 / Published: 29 Aug. 2011

Index Terms

RBF neural network, Chaotic mapping, Hash function


One-way Hash function is not only widely used in the aspects of the digital signature, identity authentication and integrity checking, etc. but also the research hotspot in the field of contemporary cryptography. In this paper, it firstly utilized neural network and practiced the chaotic sequences produced by one-dimensional nonlinear mapping. And then, it constructed Hash function with cipherkey by means of altering sequences. One of the advantages of this algorithm is that neural network hides the chaotic mapping relations and make it difficult to obtain mapping directly. Simulation experiment showed that the algorithm have good unidirectionality and weak collision, and stronger confidentiality than the tradition-based Hash function, as well as easy to achieve.

Cite This Paper

Jun Chen,Chunxiao He,Pengcheng Wei,"Hash Function Construction Based on RBFNN and Chaotic Mapping", IJEM, vol.1, no.4, pp.1-9, 2011. DOI: 10.5815/ijem.2011.04.01 


[1]H.D. Li and D.G. Feng, “Multiple discrete chaotic dynamic system and Hash function,” Chinese Journal of Computers, Vol.26, pp.21-26, April 2003.

[2]Hans Delfs, Helmut Knebl, “Introduction to cryptography principles and applications,” Berlin: Springer-verlag, 2007.

[3]Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud and Prashant Puniya, “Merkle-Damgård Revisited: How to Construct a Hash Function,” Lecture Notes in Computer Science, 2005, Vol.3621, pp.430-448.

[4]A. Swaminathan, Y.N. Mao and M. Wu, “Robust and secure image hashing,” Information Forensics and Security, IEEE Trans., Vol.1, pp.215-230, June 2006.

[5]Stefan Lucks, “A Failure-Friendly Design Principle for Hash Functions,” Lecture Notes in Computer Science, 2005, Vol.3788, pp.474-494.

[6]Kwok-Wo Wong. A Combined Chaotic Cryptographic and Hashing Scheme[J]. Physics Letters A ,2003, Vol.307, pp.292–298.

[7]X.Y. Wang, C.F. Duan and N.N. Gu, “A new chaotic cryptography based on ergodicity,” Int. J. Mod. Phys. B, 2008, Vol.22, pp.901-908.

[8]W. Zhang, J. Peng, H.Q. Yang, P.C. Wei. “A Digital Image Encryption Scheme Based on the Hybrid of Cellular Neural Network and Logistic[A][C] Map,” Advances in Neural Networks-ISNN2005, Chongqing, China, May/June 2005 Proceedings, Part II, pp.860-867.

[9]D. Xiao, X.F. Liao S.J. Deng. “One-way Hash Function Construction Based on the Chaotic Map with Changeable-parameter[J],” Chaos Solitons & Fractals, Vol.24, pp.65-71, January 2005.

[10]Tao Sang, Ruli Wang and Yixun Yan. “Generating Binary Bernoulli Sequences Based on a Class of Even-Symmetric Chaotic Maps[J],” IEEE Trans. on Communications, Vol.49, pp.620-623, April 2001.

[11]Guojie Hu and Zhengjin Feng, Theoretical Design for a Class of New Chaotic Stream Cipher[J], Communications Technology, 2003, Vol.4, pp.73-74.

[12]Shujun Li, Xuanqin Mou and Yuanlong Cai, Improving Security of a Chaotic Encryption Approach. Physics Letters A[J], Vol.290, pp.127-133, April 2001.

[13]Shujun Li, Xuanqin Mou and Yuanlong Cai, “Pseudo-random Bit Generator Based on Couple Chaotic Systems and its Application in Stream-ciphers[A][C] Cryptography,” In Progress in Cryptology-INDOCRYPT 2001, Lecture Notes in Computer Science, 2001, Vol.2247, pp.316-329.