Genetic Hash Algorithm

作者: Lubna M. H Nasir Eddeen , Eman M. Saleh , Doa'a Saadah

DOI: 10.1109/CSIT.2014.6805974

关键词: Hash treeSecurity of cryptographic hash functionsVisualizationCryptographic hash functionHash functionDouble hashingMerkle treeTheoretical computer scienceUniversal hashingComputer science

摘要: Security is becoming a major concern in computing. New techniques are evolving every day; one of these Hash Visualization. Visualization uses complex random generated images for security, can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algorithms. Genetic algorithms search optimization that based on the evolution living creatures. The improve visualization. algorithm was away faster than traditional previous ones, and it improved tree generate images, order obtain better larger will with higher security. security satisfied calculating fitness value each chromosome specifically designed algorithm.

参考文章(4)
Rachna Dhamija, Adrian Perrig, Déjà Vu: a user study using images for authentication usenix security symposium. pp. 4- 4 ,(2000)
Rachna Dhamija, Hash visualization in user authentication CHI '00 extended abstracts on Human factors in computing systems - CHI '00. pp. 279- 280 ,(2000) , 10.1145/633292.633455
César Estébanez, Julio César Hernández-Castro, Arturo Ribagorda, Pedro Isasi, Evolving hash functions by means of genetic programming Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06. pp. 1861- 1862 ,(2006) , 10.1145/1143997.1144300