A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

被引:30
作者
Alawida, Moatsum [1 ]
Teh, Je Sen [1 ]
Oyinloye, Damilare Peter [1 ]
Alshoura, Wafa' Hamdan [1 ]
Ahmad, Musheer [2 ]
Alkhawaldeh, Rami S. [3 ]
机构
[1] Univ Sains Malaysia USM, Sch Comp Sci, Gelugor 11800, Malaysia
[2] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[3] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
关键词
Hash functions; Chaotic communication; Perturbation methods; Cryptography; Automata; Logistics; Chaotic map; cryptography; data integrity; finite state automata; hash function; security; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2020.3002763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant, $DCFSA_{FWP}$ due to its desirable chaotic properties. These properties are analogous to hash function requirements such as diffusion, confusion and collision resistance. The proposed hash function consists of six machine states and three simple chaotic maps. This particular structure of DCFSA can process larger message blocks (leading to higher hashing rates) and optimizes its randomness. The proposed hash function is analyzed in terms of various security aspects and compared with other recently proposed chaos-based hash functions to demonstrate its efficiency and reliability. Results indicate that the proposed hash function has desirable statistical characteristics, elevated randomness, optimal diffusion and confusion properties as well as flexibility.
引用
收藏
页码:113163 / 113174
页数:12
相关论文
共 64 条
[1]  
Abdoun N., 2019, J AMB INTEL HUM COMP, V11, P2137
[2]   Secure Network Coding with Minimum Overhead Based on Hash Functions [J].
Adeli, Majid ;
Liu, Huaping .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) :956-958
[3]   A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps [J].
Ahmad M. ;
Khurana S. ;
Singh S. ;
AlSharari H.D. .
3D Research, 2017, 8 (02)
[4]   Thermodynamic analysis and multi-objective optimisation of endoreversible Lenoir heat engine cycle based on the thermo-economic performance criterion [J].
Ahmadi, Mohammad H. ;
Nazari, Mohammad Alhuyi ;
Feidt, Michel .
INTERNATIONAL JOURNAL OF AMBIENT ENERGY, 2019, 40 (06) :600-609
[5]   A novel parallel hash function based on 3D chaotic map [J].
Akhavan, Amir ;
Samsudin, Azman ;
Akhshani, Afshin .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2013,
[6]   Enhanced digital chaotic maps based on bit reversal with applications in random bit generators [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je .
INFORMATION SCIENCES, 2020, 512 :1155-1169
[7]   Digital Cosine Chaotic Map for Cryptographic Applications [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Teh, Je Sen ;
Alshoura, Wafa Hamdan .
IEEE ACCESS, 2019, 7 :150609-150622
[8]   Deterministic chaotic finite-state automata [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Teh, Je Sen ;
Alshoura, Wafa' Hamdan .
NONLINEAR DYNAMICS, 2019, 98 (03) :2403-2421
[9]   An image encryption scheme based on hybridizing digital chaos and finite state machine [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Samsudin, Azman ;
Alshoura, Wafa Hamdan .
SIGNAL PROCESSING, 2019, 164 :249-266
[10]   A New Chaotic Image Watermarking Scheme Based on SVD and IWT [J].
Alshoura, Wafa' Hamdan ;
Zainol, Zurinahni ;
Teh, Je Sen ;
Alawida, Moatsum .
IEEE ACCESS, 2020, 8 :43391-43406