DocumentCode :
2489871
Title :
Topological chaos and chaotic iterations application to hash functions
Author :
Guyeux, Christophe ; Bahi, Jacques M.
Author_Institution :
Comput. Sci. Lab. LIFC, Univ. of Franche-Comte, Besançon, France
fYear :
2010
fDate :
18-23 July 2010
Firstpage :
1
Lastpage :
7
Abstract :
This paper introduces a new notion of chaotic algorithms. These algorithms are iterative and are based on so-called chaotic iterations. Contrary to all existing studies on chaotic iterations, we are not interested in stable states of such iterations but in their possible unpredictable behaviors. By establishing a link between chaotic iterations and the notion of Devaney´s topological chaos, we give conditions ensuring that these kind of algorithms produce topological chaos. This leads to algorithms that are highly unpredictable. After presenting the theoretical foundations of our approach, we are interested in its practical aspects. We show how the theoretical algorithms give rise to computer programs that produce true topological chaos, then we propose applications in the area of information security.
Keywords :
cryptography; file organisation; iterative methods; programming; Devaney topological chaos; chaotic iterations application; computer programs; hash functions; information security; Chaos; Computers; Security; Silicon; Variable speed drives;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Neural Networks (IJCNN), The 2010 International Joint Conference on
Conference_Location :
Barcelona
ISSN :
1098-7576
Print_ISBN :
978-1-4244-6916-1
Type :
conf
DOI :
10.1109/IJCNN.2010.5596512
Filename :
5596512
Link To Document :
بازگشت