Szczegóły publikacji
Opis bibliograficzny
Performance of computing hash-codes with chaotically-trained artificial neural networks / Jacek Tchórzewski, Aleksander BYRSKI // W: Computational Science – ICCS 2022 : 22nd international conference : London, UK, June 21–23, 2022 : proceedings, Pt. 2 / eds. Derek Groen, [et al.]. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Computer Science ; ISSN 0302-9743 ; LNCS 13351). — ISBN: 978-3-031-08753-0; e-ISBN: 978-3-031-08754-7. — S. 408–421. — Bibliogr., Abstr. — Publikacja dostępna online od: 2022-06-15. — J. Tchórzewski - afiliacja: Cracow University of Technology, Kraków
Autorzy (2)
- Tchórzewski Jacek
- AGHByrski Aleksander
Słowa kluczowe
Dane bibliometryczne
ID BaDAP | 140669 |
---|---|
Data dodania do BaDAP | 2022-06-24 |
DOI | 10.1007/978-3-031-08754-7_48 |
Rok publikacji | 2022 |
Typ publikacji | materiały konferencyjne (aut.) |
Otwarty dostęp | |
Wydawca | Springer |
Konferencja | 22nd International Conference on Computational Science |
Czasopismo/seria | Lecture Notes in Computer Science |
Abstract
The main goal of the research presented in this paper was to estimate the performance of applying neural networks trained with the usage of a chaotic model, that may serve as hashing functions. The Lorenz Attractor chaotic model was used for training data preparation, and Scaled Conjugate Gradient was used as a training algorithm. Networks consisted of two layers: a hidden layer with sigmoid neurons and an output layer with linear neurons. The method of bonding the input message with chaotic formula is presented. Created networks could return 256 or 512 bits of hash, however, this parameter can be easily adjusted before the training process. The performance analysis of networks is discussed (that is the time of hash computation) in comparison with popular standards SHA-256 and SHA-512 under the MATLAB environment. Further research may include analysis of networks’ training parameters (like mean squared error or gradient) or analysis of results of the statistical tests performed on networks output. The presented solution may be used as a security algorithm complementary to a certificated one (for example for additional data integrity checking).