Cryptographic hash functions based on ALife

Psipress (2009)
  Copy   BIBTEX

Abstract

There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, and such functions are also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, permutation-based schemes, chaotic mixing, and so on. Herein we introduce the notion of an artificial-life (ALife) hash function (ALHF), whereby the requisite mixing action of a good hash function is accomplished via ALife rules that give rise to complex evolution of a given system. Various security tests have been run, and the results reported for examples of ALHFs

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 99,484

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Cryptographic hash functions from sequences of lifted Paley graphs.Serena Yuan - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
Time polynomial in input or output.Yuri Gurevich & Saharon Shelah - 1989 - Journal of Symbolic Logic 54 (3):1083-1088.
Approximate counting by hashing in bounded arithmetic.Emil Jeřábek - 2009 - Journal of Symbolic Logic 74 (3):829-860.
Ethics and artificial life: From modeling to moral agents. [REVIEW]John P. Sullins - 2005 - Ethics and Information Technology 7 (3):139-148.

Analytics

Added to PP
2012-06-15

Downloads
504 (#49,186)

6 months
3 (#1,430,484)

Historical graph of downloads
How can I increase my downloads?

Author Profiles

Mark Bedau
Reed College
Michael J. Raven
University of Victoria

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references