CN107800531A - A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash - Google Patents

A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash Download PDF

Info

Publication number
CN107800531A
CN107800531A CN201711326605.XA CN201711326605A CN107800531A CN 107800531 A CN107800531 A CN 107800531A CN 201711326605 A CN201711326605 A CN 201711326605A CN 107800531 A CN107800531 A CN 107800531A
Authority
CN
China
Prior art keywords
chaos system
hash
chaos
cycle
finite accuracy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711326605.XA
Other languages
Chinese (zh)
Inventor
罗玉玲
欧阳雪
刘俊秀
刘运祺
岑明灿
莫家玲
廖志贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Normal University
Original Assignee
Guangxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Normal University filed Critical Guangxi Normal University
Priority to CN201711326605.XA priority Critical patent/CN107800531A/en
Publication of CN107800531A publication Critical patent/CN107800531A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of method in the cycle of chaos system under table analysis finite accuracy using Hash, it is characterised in that comprises the following steps:1)The generation of chaos sequence;2)The construction of hash function;3)Obtain Hash table storage address;4)The cycle of chaos system searches.This method passes through some position for the element in chaos sequence being mapped in Hash table, when the Hash table directly conducted interviews when the lookup of chaos sequence can obtain the cycle of chaos sequence, to accelerate the speed searched, and seeking scope can be reduced, can quickly search cycle of the chaos system under finite accuracy, the time of storage and the lookup consumption of data is substantially reduced, can almost regard constant time as.

Description

A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash
Technical field
The present invention relates to cycle location technology of the fast positioning chaos system under computer finite accuracy, is specifically one kind Using the method in the cycle of chaos system under Hash table analysis finite accuracy.
Background technology
Chaos refers to uncertain, the similar randomness that certainty dynamic system is shown because sensitive to initial value Motion.In theory, chaos system has the characteristics that ergodic, the sensitiveness to primary condition, long-term unpredictability, and And chaos system or chaotic maps have preferable advanced dynamic.Digital chaotic system is normally based on computer or numeral electricity Road system realizes, still, because the computational accuracy of computer or digital circuit is limited, therefore digital chaotic system meeting There is the defects of long period, nondenaturing PAGE, linear complexity are low and correlation is strong, due to limited computational accuracy, this short week Phase phenomenon is referred to as finite precision effect.
In the practical application such as secure communication and image encryption, the performance of chaos system is influenceed by finite accuracy, leads to The security of Image Encryption Scheme of the research based on chaos sequence is crossed, can be bright only by the difference selection of three plaintext images Text is analyzed to attack chaos system, and therefore, digital chaotic system dynamics degenerate problem causes the concern of scholars.In order to grind The dynamics for studying carefully chaos system is degenerated, and its short periodic phenomena is the emphasis of research.Short periodic phenomena is that chaos sequence the cycle occurs Property circulation or fixing point, therefore cycle of fast positioning chaos system and to study its short periodic phenomena be vital, however, The basic thought of the cycle methods of tradition positioning chaos system is to compare each element of chaos system in order, until finding repetition Chaos value, be that average search length is larger, less efficient when the element of chaos system is more the shortcomings that this method.Cause This, quickly searches the repetition values of chaos system, it is necessary to a kind of new method for positioning the chaos system cycle under finite accuracy.
Hash also known as " hashes ", is by calculating Hash Round Robin data partition, breaking original relation between element, make the member in set Element is arranged according to the classification of hash function.Hash table is referred to as according to the storage organization of Hash storage method, Hash table be by Element in set is mapped to the storage location being recorded in table, simply enters and searches the element and can find it and deposit accordingly Storage space is put.
The content of the invention
The purpose of the present invention is in view of the shortcomings of the prior art, and to provide a kind of use and mixed under Hash table analysis finite accuracy The method in the cycle of ignorant system.This method by some position for the element in chaos sequence being mapped in Hash table, The Hash table directly to be conducted interviews when the lookup of progress chaos sequence can obtain the cycle of chaos sequence, to accelerate to look into The speed looked for, and seeking scope can be reduced, can quickly search cycle of the chaos system under finite accuracy, data The time of storage and lookup consumption substantially reduces, and can almost regard constant time as.
Realizing the technical scheme of the object of the invention is:
The method in the cycle of chaos system, comprises the following steps under a kind of table analysis finite accuracy using Hash:
1) generation of chaos sequence:In this stage, it is thus necessary to determine that the computational accuracy of computer, the initial value of chaos system And systematic parameter, and the iterations of chaos system, the condition of initialization is substituted into chaos system, obtains one group of chaos sequence Row;
2) construction of hash function:Hash lookup is firstly the need of one hash function of construction, by original intuitively chaos system The output of system is mapped as random value;
3) Hash table storage address is obtained:Chaos system is exported to the hash function acquisition chaos system for substituting into step 1) construction The Hash Round Robin data partition of system, Hash table storage location corresponding to chaos system output can be found by Hash Round Robin data partition;
4) cycle of chaos system searches:With reference to step 2), if chaos system occur in Hash table two or two with During upper identical storage location, illustrate that repeating occurs in the output of chaos system, that is, obtain chaos system second in Hash table At the time of secondary identical storage location, as cycle of the chaos system under finite accuracy.
The construction of hash function described in step 1), comprises the following steps:
(1) constant A (0 < A < 1) is multiplied by with chaos system value key first, extracts its fractional part, obtain [keyA];
(2) following operate is carried out:
H (key)=floor (m (keyA- [keyA])), (1)
Wherein, floor () represents the maximum integer more than (), and m is arbitrary constant.
Constant A described in step (1) is:
The advantages of this hash function is that m can select arbitrary constant, also, constant A ∈ (0,1), due to finite accuracy Under the element of chaos system be mainly decimal, the element of chaos system can be converted into from decimal by the hash function whole Number, therefore, the hash function is suitable for quickly searching the chaos system cycle under finite accuracy.
The technical program designs construction hash function first, and chaos system is exported and substitutes into hash function, obtains chaos system The storage location that system output is calculated with hash function, i.e. Hash Round Robin data partition, it is defeated can to find chaos system by Hash Round Robin data partition Go out corresponding storage location, because chaos system produces chaotic dynamics performance degradation under the finite accuracy of computer, and go out Existing short periodic phenomena, so chaos system after successive ignition, may export multiple identical iterative values, utilizes Hash table Identical storage location is found, i.e., the output of chaos system is identical twice, it is hereby achieved that the cycle of chaos system.
The technical program is associated with chaos system output by the storage location of record using the thought of Function Mapping, without Searching loop search, directly according to chaos system output and mapping relations calculate storage location of the output in Hash table from And the cycle of chaos system is found out, seeking scope can be significantly reduced, can quickly search chaos system in finite accuracy Under cycle.
This method can reduce seeking scope, can quickly search cycle of the chaos system under finite accuracy, number According to storage and search consumption time substantially reduce.
Brief description of the drawings
Fig. 1 is the method flow schematic diagram of embodiment.
Embodiment
Present invention is further elaborated with reference to the accompanying drawings and examples, but is not limitation of the invention.
Embodiment:
Reference picture 1, a kind of method in the cycle of chaos system under table analysis finite accuracy using Hash, including following step Suddenly:
1) generation of chaos sequence:In this stage, it is thus necessary to determine that the computational accuracy of computer, the initial value of chaos system And systematic parameter, and the iterations of chaos system, the condition of initialization is substituted into chaos system, obtains one group of chaos sequence Row;
2) construction of hash function:Hash lookup is firstly the need of one hash function of construction, by original intuitively chaos system The output of system is mapped as random value;
3) Hash table storage address is obtained:Chaos system is exported to the hash function acquisition chaos system for substituting into step 1) construction The Hash Round Robin data partition of system, Hash table storage location corresponding to chaos system output can be found by Hash Round Robin data partition;
4) cycle of chaos system searches:With reference to step 2), if chaos system occur in Hash table two or two with During upper identical storage location, illustrate that repeating occurs in the output of chaos system, that is, obtain chaos system second in Hash table At the time of secondary identical storage location, as cycle of the chaos system under finite accuracy.
The construction of hash function described in step 1), comprises the following steps:
(1) constant A (0 < A < 1) is multiplied by with chaos system value key first, extracts its fractional part, obtain [keyA];
(2) following operate is carried out:
H (key)=floor (m (keyA- [keyA])), (1)
Wherein, floor () represents the maximum integer more than (), and m is arbitrary constant.
Constant A described in step (1) is:
The advantages of this hash function is that m can select arbitrary constant, and in this example, m is 2 integral number power, also, constant A ∈ (0,1), can be by the hash function by chaos system because the element of the chaos system under finite accuracy is mainly decimal The element of system is converted into integer from decimal, and therefore, the hash function is suitable for quickly searching the chaos system under finite accuracy Cycle.

Claims (3)

1. a kind of method in the cycle of chaos system under table analysis finite accuracy using Hash, it is characterised in that including following step Suddenly:
1) generation of chaos sequence:Determine the computational accuracy of computer, the initial value of chaos system and systematic parameter, and chaos The iterations of system, the condition of initialization is substituted into chaos system, obtains one group of chaos sequence;
2) construction of hash function:A hash function is constructed, the output of original intuitively chaos system is mapped as random value;
3) Hash table storage address is obtained:Chaos system is exported and substitutes into the hash function acquisition chaos system that step 1) constructs Hash Round Robin data partition, Hash table storage location corresponding to chaos system output can be found by Hash Round Robin data partition;
4) cycle of chaos system searches:With reference to step 2), if there are two or more phases in Hash table in chaos system With storage location when, illustrate chaos system output occur repeat, that is, obtain chaos system second of phase in Hash table With storage location at the time of, as cycle of the chaos system under finite accuracy.
2. the method in the cycle of chaos system, its feature under the table analysis finite accuracy according to claim 1 using Hash It is, the construction of the hash function described in step 1), comprises the following steps:
(1) constant A (0 < A < 1) is multiplied by with chaos system value key first, extracts its fractional part, obtain [keyA];
(2) following operate is carried out:
H (key)=floor (m (keyA- [keyA])), (1)
Wherein, floor () represents the maximum integer more than (), and m is arbitrary constant.
3. the method in the cycle of chaos system, its feature under the table analysis finite accuracy according to claim 2 using Hash It is, the constant A that step (1) is stated is:
<mrow> <mi>A</mi> <mo>=</mo> <mrow> <mo>(</mo> <msqrt> <mn>5</mn> </msqrt> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>/</mo> <mn>2.</mn> </mrow>
CN201711326605.XA 2017-12-13 2017-12-13 A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash Pending CN107800531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711326605.XA CN107800531A (en) 2017-12-13 2017-12-13 A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711326605.XA CN107800531A (en) 2017-12-13 2017-12-13 A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash

Publications (1)

Publication Number Publication Date
CN107800531A true CN107800531A (en) 2018-03-13

Family

ID=61537841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711326605.XA Pending CN107800531A (en) 2017-12-13 2017-12-13 A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash

Country Status (1)

Country Link
CN (1) CN107800531A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100459487C (en) * 2003-12-31 2009-02-04 华中科技大学 Chaotic cipher production method under limited precision
CN101872339A (en) * 2010-06-11 2010-10-27 南京邮电大学 Hash algorithm based on complex dynamic network
CN102184205A (en) * 2011-04-28 2011-09-14 哈尔滨工业大学 Multi-mode string matching algorithm based on extended precision chaos hash
CN102289425A (en) * 2011-04-28 2011-12-21 哈尔滨工业大学 Hash algorithm based on extensible precision chaos
CN102594566A (en) * 2012-03-12 2012-07-18 浙江工业大学 Chaos message authentication code realization method for wireless sensor network
CN104618091A (en) * 2015-02-16 2015-05-13 哈尔滨理工大学 Dual-chaotic system dynamic key and RSA jointed streaming media secret communication method
EP2966801A1 (en) * 2014-07-08 2016-01-13 Europa-Universität Viadrina Franfurt (ODER) Chaotic based hash function and their use to authentication.
CN105681273A (en) * 2015-12-17 2016-06-15 西安电子科技大学 Client data deduplication method
CN106598969A (en) * 2015-10-14 2017-04-26 北京国双科技有限公司 Data query method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100459487C (en) * 2003-12-31 2009-02-04 华中科技大学 Chaotic cipher production method under limited precision
CN101872339A (en) * 2010-06-11 2010-10-27 南京邮电大学 Hash algorithm based on complex dynamic network
CN102184205A (en) * 2011-04-28 2011-09-14 哈尔滨工业大学 Multi-mode string matching algorithm based on extended precision chaos hash
CN102289425A (en) * 2011-04-28 2011-12-21 哈尔滨工业大学 Hash algorithm based on extensible precision chaos
CN102594566A (en) * 2012-03-12 2012-07-18 浙江工业大学 Chaos message authentication code realization method for wireless sensor network
EP2966801A1 (en) * 2014-07-08 2016-01-13 Europa-Universität Viadrina Franfurt (ODER) Chaotic based hash function and their use to authentication.
CN104618091A (en) * 2015-02-16 2015-05-13 哈尔滨理工大学 Dual-chaotic system dynamic key and RSA jointed streaming media secret communication method
CN106598969A (en) * 2015-10-14 2017-04-26 北京国双科技有限公司 Data query method and device
CN105681273A (en) * 2015-12-17 2016-06-15 西安电子科技大学 Client data deduplication method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROGELIO HASIMOTO-BELTRÁN等: "Cycle detection for secure chaos-based encryption", 《COMMUN NONLINEAR SCI NUMER SIMULAT》 *
罗玉玲: "混沌图像编码加密及Hash函数构造研究", 《中国博士学位论文全文数据库》 *

Similar Documents

Publication Publication Date Title
WO2018032721A1 (en) Image sharing method based on thumbnail image and terminal
Yuan et al. EncKV: An encrypted key-value store with rich queries
Awad et al. Chaotic searchable encryption for mobile cloud storage
Zou et al. Efficient and secure encrypted image search in mobile cloud computing
CN105808622A (en) File storage method and device
WO2016134628A1 (en) Hybrid data distribution in a massively parallel processing architecture
CN102542405A (en) Digital archive storage and identification method and system
CN103699679A (en) Method and equipment for retrieving information of target objects
US20210044653A1 (en) Method, apparatus, client terminal, and server for data processing
CN108390760A (en) Public key keyword can search for encryption method end to end in a kind of cloud data transmission
CN104298687A (en) Hash partitioning management method and device
CN106599091A (en) Storage and indexing method of RDF graph structures stored based on key values
Yuan et al. Towards privacy-preserving and practical image-centric social discovery
Kang et al. A security-aware data placement mechanism for big data cloud storage systems
CN107086917B (en) The encryption method that a kind of parallelization and structuring public key can search for
CN104102748B (en) File Mapping method and device and file recommendation method and device
CN105389398A (en) Picture photographing and searching method and device
CN107800531A (en) A kind of method in the cycle of chaos system under table analysis finite accuracy using Hash
Su et al. Design and implementation of various file deduplication schemes on storage devices
US11106488B2 (en) Blockchain read/write data processing method, apparatus, and server
Parsola et al. Mobile application for storage and retrieval of e-learning videos using hadoop
CN113763099A (en) Data searching method, device, equipment and storage medium
CN112307035B (en) Method and device for managing characteristic value ID, electronic equipment and storage medium
Wadhwa et al. Distributed locality sensitivity hashing
Wei et al. Verifiable multi-keyword fuzzy search over encrypted data in the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180313

RJ01 Rejection of invention patent application after publication