A Topological Study of Chaotic Iterations. Application to Hash Functions

August 21, 2016 ยท Declared Dead ยท ๐Ÿ› Computational Intelligence for Privacy and Security

๐Ÿ‘ป CAUSE OF DEATH: Ghosted
No code link whatsoever

"No code URL or promise found in abstract"

Evidence collected by the PWNC Scanner

Authors Christophe Guyeux, Jacques M. Bahi arXiv ID 1608.05920 Category nlin.CD Cross-listed cs.CR, math.DS Citations 17 Venue Computational Intelligence for Privacy and Security Last Checked 1 month ago
Abstract
Chaotic iterations, a tool formerly used in distributed computing, has recently revealed various interesting properties of disorder leading to its use in the computer science security field. In this paper, a comprehensive study of its topological behavior is proposed. It is stated that, in addition to being chaotic as defined in the Devaney's formulation, this tool possesses the property of topological mixing. Additionally, its level of sensibility, expansivity, and topological entropy are evaluated. All of these properties lead to a complete unpredictable behavior for the chaotic iterations. As it only manipulates binary digits or integers, we show that it is possible to use it to produce truly chaotic computer programs. As an application example, a truly chaotic hash function is proposed in two versions. In the second version, an artificial neural network is used, which can be stated as chaotic according to Devaney.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” nlin.CD

Died the same way โ€” ๐Ÿ‘ป Ghosted