Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

被引:14
|
作者
Ayubi, Peyman [1 ]
Setayeshi, Saeed [2 ]
Rahmani, Amir Masoud [1 ,3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Amirkabir Univ Technol, Dept Med Radiat Engn, Tehran, Iran
[3] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, 123 Univ Rd,Sect 3, Touliu 64002, Yunlin, Taiwan
关键词
Chaotic hash function; Chaotic map; Complex quadratic map; Security; SCHEME;
D O I
10.1016/j.chaos.2023.113647
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the last two decades, the use of chaotic iterative maps in cryptographic systems, especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial conditions and control parameters in chaotic systems is the best feature for designing a chaotic hash function. This paper introduces a new generalized chaotic map based on a complex quadratic map, which in addition to the chaotic behavior in the real and imaginary parts, also has a high key length, which can guarantee the security of a cryptographic system. Various analyses of dynamical systems, such as the bifurcation diagram and the Lyapunov exponent, show that the proposed chaotic map has the characteristics of a chaotic dynamical system. The foundation of a secure and efficient algorithm for designing and developing a new hash function lies in how to use this new chaotic map. Also, statistical analysis, collision analysis, key space analysis, and speed analysis use to prove the security and efficiency of the proposed method. The results of these analyses and their comparison with similar methods show that the proposed method can be a reliable and efficient method for practical applications in information technology.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Keyed hash function based on a chaotic map
    Kanso, A.
    Yahyaoui, H.
    Almulla, M.
    INFORMATION SCIENCES, 2012, 186 (01) : 249 - 264
  • [2] A Topologically Simple Keyed Hash Function Based on Circular Chaotic Sinusoidal Map Network
    Jiteurtragool, N.
    Ketthong, P.
    Wannaboon, C.
    San-Um, W.
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1089 - 1094
  • [3] Collision of one keyed hash function based on chaotic map and analysis
    Shandong Computer Science Center, Jinan 250014, China
    不详
    Wuli Xuebao, 2008, 5 (2737-2742):
  • [4] The collision of one keyed hash function based on chaotic map and analysis
    Wang Ji-Zhi
    Wang Mei-Qin
    Wang Ying-Long
    ACTA PHYSICA SINICA, 2008, 57 (05) : 2737 - 2742
  • [5] A keyed hash function based on the modified coupled chaotic map lattice
    Li, Da
    Hu, Gang
    Wang, Shihong
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (06) : 2579 - 2587
  • [6] A Topologically Simple Keyed Hash Function using a Single Robust Absolute-Value Chaotic Map
    San-Um, Wimol
    Srichavengsup, Warakorn
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2013, : 95 - 99
  • [7] Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
    Lin, Zhuosheng
    Guyeux, Christophe
    Yu, Simin
    Wang, Qianxue
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 404 - 414
  • [8] Parallel keyed hash function construction based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Deng, Shaojiang
    PHYSICS LETTERS A, 2008, 372 (26) : 4682 - 4688
  • [9] Cryptanalysis on a parallel keyed hash function based on chaotic maps
    Guo, Wei
    Wang, Xiaoming
    He, Dake
    Cao, Yang
    PHYSICS LETTERS A, 2009, 373 (36) : 3201 - 3206
  • [10] Hash function based on chaotic map lattices
    Wang, Shihong
    Hu, Gang
    CHAOS, 2007, 17 (02)