Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Data Information Security Algorithm Based on Chaos and Hash Function
by
Liu, Hui
in
34H10
/ Chaos
/ Dynamic parameters
/ Hash function
/ Hash function with key
/ Key security algorithm
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Data Information Security Algorithm Based on Chaos and Hash Function
by
Liu, Hui
in
34H10
/ Chaos
/ Dynamic parameters
/ Hash function
/ Hash function with key
/ Key security algorithm
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Data Information Security Algorithm Based on Chaos and Hash Function
Journal Article
Data Information Security Algorithm Based on Chaos and Hash Function
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Chaotic systems are characterized by unidirectional, diffusive and initial value sensitivity of hash. Academia can use it to optimize algorithms for mathematical and computer encryption keys. This paper focuses on a hash function mixed chaotic system with a key. Then the state value and chaotic mapping relationship of the chaotic system are modified, and hash conclusions are obtained. Then the optimal design of messy technology with key hash is introduced briefly. A chaotic dynamic model with improved dynamic parameters is proposed to prevent chaos from affecting the speed and security of the algorithm. The results show that this method can effectively resist the attack of forging and peer keys. Moreover, the computation required by this algorithm is almost negligible.
Publisher
Sciendo,De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
Subject
MBRLCatalogueRelatedBooks
This website uses cookies to ensure you get the best experience on our website.