• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com


Paper Details

Implementation of Hash Function Based On Neural Cryptography?

Vineeta Soni, Mrs. Sarvesh Tanwar, Prof. Prema K.V.?

Journal Title:International Journal of Computer Science and Mobile Computing - IJCSMC
Abstract


In this paper a new hash function is constructed based on multilayer feed forward network with piecewise linear chaotic map. Chaos has been used in data protection because of the features of initial value sensitivity, random similarity and ergodicity. We have used three neuronal layers to prove confusion, diffusion and compression respectively. This hash function takes input of arbitrary length and generate a fixed length hash value.(128 bit, 256 bit or 512 bit). By performance analysis and results we have shown that generated hash function is one way, collision resistant and secure against birthday attacks and man in middle attacks.

Download