Abstract
As one of the cores of Cryptography, hashing is a basic technique for information security (Schneier, 1996; Stinson, 1995). A cryptographic hash function is used to compress the message data to a fixed-size hash value in such a way that any alternation to the data will generate a different hash value. Chaos is a kind of deterministic random-like process provided by nonlinear dynamic systems. Chaotic systems are systems that are random-like, but in fact are not random. They are governed by physical laws to make the accurate prediction almost impossible. It is a promising direction to utilize the characteristics of chaos to design hash function.
Original language | English (US) |
---|---|
Title of host publication | Multimedia Security |
Subtitle of host publication | Watermarking, Steganography, and Forensics |
Publisher | CRC Press |
Pages | 313-325 |
Number of pages | 13 |
ISBN (Electronic) | 9781439873328 |
ISBN (Print) | 9781439873311 |
DOIs | |
State | Published - Jan 1 2017 |
All Science Journal Classification (ASJC) codes
- General Computer Science
- General Engineering