A novel combined cryptographic and hash algorithm based on chaotic control character

被引:20
作者
Deng, Shaojiang [1 ]
Xiao, Di [1 ]
Li, Yantao [1 ]
Peng, Wenbin [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci & Engn, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Hash function; Chaos; Control character; Look-up index table; BLOCK ENCRYPTION ALGORITHM; CRYPTOSYSTEM; SECURITY; MAP; KEY; CRYPTANALYSIS; SYSTEMS;
D O I
10.1016/j.cnsns.2009.02.020
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A novel combined cryptographic and hash algorithm based on chaotic control character is proposed in this paper. The control character is generated by chaotic iteration. The plaintext is pre-processed in terms of control character, and then encrypted by the look-up index table. At the same time, the chaotic trajectory is changed continuously according to the control character, which can avoid the dynamical degradation of chaos. Besides, the look-up index table is updated by utilizing the control character continuously, and the index item of the final look-up index table can be considered as the hash value of the whole paragraph of plaintext. Therefore, the proposed algorithm can perform both encryption/decryption and hash in a combined manner. Compared with Wong's and our former algorithms, the proposed one has decreased the ratio of ciphertext/plaintext to 1, and improved the efficiency greatly. Theoretical analysis and computer simulation verify the validity of the proposed algorithm. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:3889 / 3900
页数:12
相关论文
共 16 条
[1]   Cryptanalysis of dynamic look-up table based chaotic cryptosystems [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2004, 326 (3-4) :211-218
[2]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[3]   A new hash competition [J].
Burr, William E. .
IEEE SECURITY & PRIVACY, 2008, 6 (03) :60-62
[4]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[5]  
GE X, 2007, COMPUT ENG DES, V28, P5595
[6]   Logistic map as a block encryption algorithm [J].
Kocarev, L ;
Jakimoski, G .
PHYSICS LETTERS A, 2001, 289 (4-5) :199-206
[7]   Secure hash function based on neural network [J].
Lian, Shiguo ;
Sun, Jinsheng ;
Wang, Zhiquan .
NEUROCOMPUTING, 2006, 69 (16-18) :2346-2350
[8]   Security of public key encryption technique based on multiple chaotic systems [J].
Wang, Kai ;
Pei, Wenjiang ;
Zou, Liuhua ;
Cheung, Yiu-ming ;
He, Zhenya .
PHYSICS LETTERS A, 2006, 360 (02) :259-262
[9]   A block encryption algorithm based on dynamic sequences of multiple chaotic systems [J].
Wang Xing-yuan ;
Yu Qing .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (02) :574-581
[10]   Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map [J].
Wang, Yong ;
Liao, Xiaofeng ;
Xiang, Tao ;
Wong, Kwok-Wo ;
Yang, Degang .
PHYSICS LETTERS A, 2007, 363 (04) :277-281