A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps

被引:39
作者
Ahmad M. [1 ]
Khurana S. [1 ]
Singh S. [1 ]
AlSharari H.D. [2 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
[2] Department of Electrical Engineering, College of Engineering, Al Jouf University, Al-Jouf
关键词
Confusion and diffusion; Hash function; Multiple chaotic maps; Security;
D O I
10.1007/s13319-017-0123-1
中图分类号
学科分类号
摘要
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way computations, which favor the construction of cryptographic hash functions. In this paper, we propose to present a novel hash function scheme which uses multiple chaotic maps to generate efficient variable-sized hash functions. The message is divided into four parts, each part is processed by a different 1D chaotic map unit yielding intermediate hash code. The four codes are concatenated to two blocks, then each block is processed through 2D chaotic map unit separately. The final hash value is generated by combining the two partial hash codes. The simulation analyses such as distribution of hashes, statistical properties of confusion and diffusion, message and key sensitivity, collision resistance and flexibility are performed. The results reveal that the proposed anticipated hash scheme is simple, efficient and holds comparable capabilities when compared with some recent chaos-based hash algorithms. © 2017, 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg.
引用
收藏
相关论文
共 67 条
[1]  
Konheim A.G., Hashing in computer science: Fifty years of slicing and dicing, (2010)
[2]  
Preneel B., Analysis and design of cryptographic hash functions, (1993)
[3]  
AlAhmad M.A., Alshaikhli I.F., Broad view of cryptographic hash functions, International Journal of Computer Science Issues, 10, 4, pp. 239-246, (2013)
[4]  
Xiao D., Liao X., Deng S., Chaos based hash function, chaos-based cryptography, (2011)
[5]  
Katz J., Lindell Y., Introduction to modern cryptography, (2014)
[6]  
Rivest R.L., The MD4 message digest algorithm, Lecture Notes in Computer Science, 537, pp. 303-311, (1991)
[7]  
Rivest R., The MD5 message-digest algorithm, (1992)
[8]  
Secure Hash Standard, Federal information processing standard (FIPS), (1993)
[9]  
Secure Hash Standard, Federal information processing standard (FIPS), (1995)
[10]  
Menezes A.J., Oorschot P.C.V., Vanstone S.A., Handbook of applied cryptography, (1997)