A novel combined cryptographic and hash algorithm based on chaotic control character

被引:20
作者
Deng, Shaojiang [1 ]
Xiao, Di [1 ]
Li, Yantao [1 ]
Peng, Wenbin [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci & Engn, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Hash function; Chaos; Control character; Look-up index table; BLOCK ENCRYPTION ALGORITHM; CRYPTOSYSTEM; SECURITY; MAP; KEY; CRYPTANALYSIS; SYSTEMS;
D O I
10.1016/j.cnsns.2009.02.020
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A novel combined cryptographic and hash algorithm based on chaotic control character is proposed in this paper. The control character is generated by chaotic iteration. The plaintext is pre-processed in terms of control character, and then encrypted by the look-up index table. At the same time, the chaotic trajectory is changed continuously according to the control character, which can avoid the dynamical degradation of chaos. Besides, the look-up index table is updated by utilizing the control character continuously, and the index item of the final look-up index table can be considered as the hash value of the whole paragraph of plaintext. Therefore, the proposed algorithm can perform both encryption/decryption and hash in a combined manner. Compared with Wong's and our former algorithms, the proposed one has decreased the ratio of ciphertext/plaintext to 1, and improved the efficiency greatly. Theoretical analysis and computer simulation verify the validity of the proposed algorithm. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:3889 / 3900
页数:12
相关论文
共 16 条
  • [1] Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    [J]. PHYSICS LETTERS A, 2004, 326 (3-4) : 211 - 218
  • [2] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [3] A new hash competition
    Burr, William E.
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (03) : 60 - 62
  • [4] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [5] GE X, 2007, COMPUT ENG DES, V28, P5595
  • [6] Logistic map as a block encryption algorithm
    Kocarev, L
    Jakimoski, G
    [J]. PHYSICS LETTERS A, 2001, 289 (4-5) : 199 - 206
  • [7] Secure hash function based on neural network
    Lian, Shiguo
    Sun, Jinsheng
    Wang, Zhiquan
    [J]. NEUROCOMPUTING, 2006, 69 (16-18) : 2346 - 2350
  • [8] Security of public key encryption technique based on multiple chaotic systems
    Wang, Kai
    Pei, Wenjiang
    Zou, Liuhua
    Cheung, Yiu-ming
    He, Zhenya
    [J]. PHYSICS LETTERS A, 2006, 360 (02) : 259 - 262
  • [9] A block encryption algorithm based on dynamic sequences of multiple chaotic systems
    Wang Xing-yuan
    Yu Qing
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (02) : 574 - 581
  • [10] Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
    Wang, Yong
    Liao, Xiaofeng
    Xiang, Tao
    Wong, Kwok-Wo
    Yang, Degang
    [J]. PHYSICS LETTERS A, 2007, 363 (04) : 277 - 281