Design and security analysis of two robust keyed hash functions based on chaotic neural networks

被引:12
作者
Abdoun, Nabil [1 ]
El Assad, Safwan [1 ]
Deforges, Olivier [2 ]
Assaf, Rima [3 ]
Khalil, Mohamad [3 ]
机构
[1] Site Polytech Nantes, CNRS, UMR 6164, Inst Electron & Telecommun Rennes, Nantes, France
[2] Site INSA Rennes, Inst Electron & Telecommun Rennes, Rennes, France
[3] Lebanese Univ, Beirut, Lebanon
关键词
Keyed hash functions; Chaotic neural networks; Chaotic activation function; Merkle-Damgard; Statistical tests; Brute force attacks; Cryptanalytical attacks; Speed analysis; SCHEME; PREIMAGES; MAP;
D O I
10.1007/s12652-019-01244-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we designed, implemented, and analyzed the performance, in terms of security and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on Merkle-Damgard (MD) construction with three output schemes: CNN-Matyas-Meyer-Oseas, Modified CNN-Matyas-Meyer-Oseas, and CNN-Miyaguchi-Preneel. The first hash function's structure is composed of two-layer chaotic neural network while the structure of the second hash function is formed of one-layer chaotic neural network followed by non-linear layer functions. The obtained results of several statistical tests and cryptanalytic analysis highlight the robustness of the proposed keyed CNN hash functions, which is fundamentally due to the strong non-linearity of both the chaotic systems and the neural networks. The comparison of the performance analysis with some chaos-based hash functions of the literature and with standard hash functions make the proposed hash functions suitable for data integrity, message authentication, and digital signature applications.
引用
收藏
页码:2137 / 2161
页数:25
相关论文
共 90 条
[1]  
Abdoun N, 2016, 11 INT C COMM
[2]  
Abdoun N, 2015, INT CONF INTERNET, P32, DOI 10.1109/ICITST.2015.7412051
[3]   Hash function based on piecewise nonlinear chaotic map [J].
Akhavan, A. ;
Samsudin, A. ;
Akhshani, A. .
CHAOS SOLITONS & FRACTALS, 2009, 42 (02) :1046-1053
[4]   A novel parallel hash function based on 3D chaotic map [J].
Akhavan, Amir ;
Samsudin, Azman ;
Akhshani, Afshin .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2013,
[5]   Chaos-based hash function (CBHF) for cryptographic applications [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
El-Latif, Ahmed A. Abd .
CHAOS SOLITONS & FRACTALS, 2009, 42 (02) :767-772
[6]  
[Anonymous], 1992, MD5 MESSAGE DIGEST A
[7]  
[Anonymous], ECRYPT HASH WORKSH
[8]  
[Anonymous], 2014, CRYPTOGRAPHY NETWORK
[9]  
[Anonymous], 1995, Public Law, V100, P235
[10]  
[Anonymous], 1979, SECRECY AUTHENTICATI