Nothing Special   »   [go: up one dir, main page]

Skip to main content

Performance of Computing Hash-Codes with Chaotically-Trained Artificial Neural Networks

  • Conference paper
  • First Online:
Computational Science – ICCS 2022 (ICCS 2022)

Abstract

The main goal of the research presented in this paper was to estimate the performance of applying neural networks trained with the usage of a chaotic model, that may serve as hashing functions. The Lorenz Attractor chaotic model was used for training data preparation, and Scaled Conjugate Gradient was used as a training algorithm. Networks consisted of two layers: a hidden layer with sigmoid neurons and an output layer with linear neurons. The method of bonding the input message with chaotic formula is presented. Created networks could return 256 or 512 bits of hash, however, this parameter can be easily adjusted before the training process. The performance analysis of networks is discussed (that is the time of hash computation) in comparison with popular standards SHA-256 and SHA-512 under the MATLAB environment. Further research may include analysis of networks’ training parameters (like mean squared error or gradient) or analysis of results of the statistical tests performed on networks output. The presented solution may be used as a security algorithm complementary to a certificated one (for example for additional data integrity checking).

Supported by the funds assigned by The Polish Ministry of Education and Science to Cracow University of Technology (J.T.) and to AGH University of Science and Technology (A.B.).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Akhavan Masoumi, A., Samsudin, A., Akhshani, A.: A novel parallel hash function based on a 3D chaotic map. EURASIP J. Adv. Signal Process. 2013, 126 (2013). https://doi.org/10.1186/1687-6180-2013-126

  2. Angela. Average file sizes. https://blog.online-convert.com/average-file-sizes/. Accessed Feb 2022

  3. Bishop, C.M., Nasrabadi, N.M.: Pattern recognition and machine learning. Springer 4(4), 246–249 (2006)

    Google Scholar 

  4. Boeing, G.: Visual analysis of nonlinear dynamical systems: chaos, fractals, self-similarity and the limits of prediction. Systems 4(4) (2016). https://doi.org/10.3390/systems4040037

  5. Gong, Z.: Survey on lightweight hash functions. J. Cryptol. Res. 3(1), 1–11 (2016)

    Google Scholar 

  6. Guesmi, R., Ben Farah, M.A., Kachouri, A., Samet, M.: Hash key-based image encryption using crossover operator and chaos. Multim. Tools Appl. 75(8), 4753–4769 (2015). https://doi.org/10.1007/s11042-015-2501-0

    Article  Google Scholar 

  7. Khitish. Sha algorithms 160,224,256,384,512. https://nl.mathworks.com/matlabcentral/fileexchange/31795-sha-algorithms-160-224-256-384-512. Accessed Feb 2022

  8. Kidoň, M., Dobai, R.: Evolutionary design of hash functions for IP address hashing using genetic programming. In: 2017 IEEE Congress on Evolutionary Computation (CEC), pp. 1720–1727 (2017). https://doi.org/10.1109/CEC.2017.7969509

  9. Liu, H., Kadir, A., Liu, J.: Keyed hash function using hyper chaotic system with time-varying parameters perturbation. IEEE Access 7, 37211–37219 (2019). https://doi.org/10.1109/ACCESS.2019.2896661

    Article  Google Scholar 

  10. Marco, A., Martinez, A., Bruno, O.: Fast, parallel and secure cryptography algorithm using lorenz’s attractor. Int. J. Mod. Phys. C 21 (2012). https://doi.org/10.1142/S0129183110015166

  11. Medini, H., Sheikh, M., Murthy, D., Sathyanarayana, S., Patra, G.: Identical chaotic synchronization for hash generation. ACCENTS Trans. Inf. Secur. 2, 16–21 (2016). https://doi.org/10.19101/TIS.2017.25002

  12. Møller, M.F.: A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw. 6(4), 525–533 (1993). https://doi.org/10.1016/S0893-6080(05)80056-5

  13. NIST. The secure hash algorithm validation system (SHAVS). Tech. rep. (2012). https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/shs/SHAVS.pdf

  14. NIST. Fips 180-4: Secure hash standard (SHS). Tech. rep. (2015). https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf

  15. NIST: Fips pub 202: Sha-3 standard: permutation-based hash and extendable-output functions. Tech. rep. (2015). https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf

  16. Peng, J., Jin, S.Z., Liu, H.I., Zhang, W.: A novel hash function based on hyperchaotic lorenz system. In: Cao, B., Li, T.F., Zhang, C.Y. (eds.) Fuzzy Information and Engineering, vol. 2, pp. 1529–1536. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03664-4_162

  17. Singh, M., Garg, D.: Choosing best hashing strategies and hash functions. In: 2009 IEEE International Advance Computing Conference, pp. 50–55 (2009). https://doi.org/10.1109/IADCC.2009.4808979

  18. Süli, E., Mayers, D.F.: An Introduction to Numerical Analysis, pp. 328–329. Cambridge University Press, Cambridge (2003)

    Google Scholar 

  19. Tchórzewski, J., Jakóbik, A.: Theoretical and experimental analysis of cryptographic hash functions. J. Telecommun. Inf. Technol. (2019)

    Google Scholar 

  20. Tchórzewski, J., Jakóbik, A., Grzonka, D.: Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds. In: 33rd European Conference on Modelling and Simulation, pp. 421–427 (2019)

    Google Scholar 

  21. Tchórzewski, J., Jakóbik, A., Iacono, M.: An ANN-based scalable hashing algorithm for computational clouds with schedulers. Int. J. Appl. Math. Comput. Sci. 31(4), 697–712 (2021)

    MATH  Google Scholar 

  22. Wang, J., Zhang, T., Song, J., Sebe, N., Shen, H.T.: A survey on learning to hash. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 769–790 (2018). https://doi.org/10.1109/TPAMI.2017.2699960

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacek Tchórzewski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tchórzewski, J., Byrski, A. (2022). Performance of Computing Hash-Codes with Chaotically-Trained Artificial Neural Networks. In: Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2022. ICCS 2022. Lecture Notes in Computer Science, vol 13351. Springer, Cham. https://doi.org/10.1007/978-3-031-08754-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08754-7_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08753-0

  • Online ISBN: 978-3-031-08754-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics