A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

被引:30
作者
Alawida, Moatsum [1 ]
Teh, Je Sen [1 ]
Oyinloye, Damilare Peter [1 ]
Alshoura, Wafa' Hamdan [1 ]
Ahmad, Musheer [2 ]
Alkhawaldeh, Rami S. [3 ]
机构
[1] Univ Sains Malaysia USM, Sch Comp Sci, Gelugor 11800, Malaysia
[2] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[3] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
关键词
Hash functions; Chaotic communication; Perturbation methods; Cryptography; Automata; Logistics; Chaotic map; cryptography; data integrity; finite state automata; hash function; security; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2020.3002763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant, $DCFSA_{FWP}$ due to its desirable chaotic properties. These properties are analogous to hash function requirements such as diffusion, confusion and collision resistance. The proposed hash function consists of six machine states and three simple chaotic maps. This particular structure of DCFSA can process larger message blocks (leading to higher hashing rates) and optimizes its randomness. The proposed hash function is analyzed in terms of various security aspects and compared with other recently proposed chaos-based hash functions to demonstrate its efficiency and reliability. Results indicate that the proposed hash function has desirable statistical characteristics, elevated randomness, optimal diffusion and confusion properties as well as flexibility.
引用
收藏
页码:113163 / 113174
页数:12
相关论文
共 64 条
[31]  
Kayser R., 2007, FED REGISTER, V72, P212
[32]  
Lathrop J, 2009, THESIS
[33]   Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks [J].
Li, Chengqing ;
Feng, Bingbing ;
Li, Shujun ;
Kurths, Juergen ;
Chen, Guanrong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2019, 66 (06) :2322-2335
[34]   Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security [J].
Li, Yantao ;
Ge, Guangfu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) :17973-17994
[35]   A fast and efficient hash function based on generalized chaotic mapping with variable parameters [J].
Li, Yantao ;
Li, Xiang ;
Liu, Xiangwei .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (06) :1405-1415
[36]   Chaotic hash function based on circular shifts with variable parameters [J].
Li, Yantao ;
Li, Xiang .
CHAOS SOLITONS & FRACTALS, 2016, 91 :639-648
[37]   Chaotic hash function based on the dynamic S-Box with variable parameters [J].
Li, Yantao ;
Ge, Guangfu ;
Xia, Dawen .
NONLINEAR DYNAMICS, 2016, 84 (04) :2387-2402
[38]   Collision analysis and improvement of a hash function based on chaotic tent map [J].
Li, Yantao .
OPTIK, 2016, 127 (10) :4484-4489
[39]   Secure hash function based on chaotic tent map with changeable parameter [J].
Li, Yantao ;
Xiao, Di ;
Deng, Shaojiang .
High Technology Letters, 2012, 18 (01) :7-12
[40]   Parallel chaotic Hash function construction based on cellular neural network [J].
Li, Yantao ;
Xiao, Di ;
Li, Huaqing ;
Deng, Shaojiang .
NEURAL COMPUTING & APPLICATIONS, 2012, 21 (07) :1563-1573