Cryptanalysis on a parallel keyed hash function based on chaotic neural network

被引:24
作者
Wang, Xing-yuan [1 ]
Zhao, Jian-feng [1 ]
机构
[1] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Chaotic neural network; Weak key; Forgery attack; Security; MAPS;
D O I
10.1016/j.neucom.2010.05.011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we analyze the security of a parallel keyed hash function based on chaotic neural network proposed by Xiao et al. recently. Weak keys and forgery attacks against Xiao et al.'s scheme are demonstrated. Both theoretical analysis and experimental results show that the parallel keyed hash function is not security. Besides, some improvement measures are presented to enhance the security of the parallel keyed hash function. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:3224 / 3228
页数:5
相关论文
共 7 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]   Cryptanalysis on a parallel keyed hash function based on chaotic maps [J].
Guo, Wei ;
Wang, Xiaoming ;
He, Dake ;
Cao, Yang .
PHYSICS LETTERS A, 2009, 373 (36) :3201-3206
[3]  
Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[4]   A combined chaotic cryptographic and hashing scheme [J].
Wong, KW .
PHYSICS LETTERS A, 2003, 307 (5-6) :292-298
[5]   Parallel keyed hash function construction based on chaotic maps [J].
Xiao, Di ;
Liao, Xiaofeng ;
Deng, Shaojiang .
PHYSICS LETTERS A, 2008, 372 (26) :4682-4688
[6]   Parallel keyed hash function construction based on chaotic neural network [J].
Xiao, Di ;
Liao, Xiaofeng ;
Wang, Yong .
NEUROCOMPUTING, 2009, 72 (10-12) :2288-2296
[7]   Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter [J].
Zhang, Jiashu ;
Wang, Xiaomin ;
Zhang, Wenfang .
PHYSICS LETTERS A, 2007, 362 (5-6) :439-448