Design and Analysis on a Parallel Chaos-Based Hash Function

被引:1
作者
Liu, Zhuo [2 ]
Wang, Yong [1 ]
Jiang, Gongkun [1 ]
Zhang, Leo Yu [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Guizhou Educ Univ, Sch Math & Big Data, Guiyang 550000, Peoples R China
[3] Deakin Univ, Sch Informat Technol, Geelong, Vic 3216, Australia
来源
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS | 2020年 / 30卷 / 13期
基金
中国国家自然科学基金;
关键词
Hash function; chaos; chaos-based cipher; parallel processing; security communication; CRYPTANALYSIS;
D O I
10.1142/S0218127420501886
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The inherent random-like behavior and one-way property of iteration in chaotic systems provide a good basis for designing Hash function. In the era of big data, due to the increasing data capacity in applications, fast Hash functions with parallel mode are highly desirable when authenticating data integrity. We analyze the issue of how to parallelize Hash function with iterative structure. Some security requirements on parallel Hash function are presented. In addition, using chaotic map and block cipher, we construct a keyed parallel Hash function. The message blocks are firstly processed in parallel by a DM-like structure. Furthermore, a tree mode with chaotic map is utilized to combine the outputs of the hash round function in parallel. The proposed Hash function is analyzed by theory and tested by computer simulations. The test results show that the proposed scheme can resist the various common attacks against Hash functions. It satisfies the secure performance requirements of Hash function. Owing to the usage of the parallel mode to process messages, the proposed chaos-based Hash function possess high efficiency and has high potential in applications to guarantee data integrity on a parallel computing platform.
引用
收藏
页数:18
相关论文
共 39 条
  • [1] Ahmad M, 2017, 3D RES, V8, DOI 10.1007/s13319-017-0123-1
  • [2] [Anonymous], 2004, Cryptol. ePrint Arch., Tech. Rep. 2004/199
  • [3] Atighehchi K., 2010, IACR CRYPTOLOGY EPRI, P432
  • [4] Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 824 - 839
  • [5] Damgard I., 1989, LECT NOTES COMPUTER, V435, P416
  • [6] Davies R.W., 1984, PROC INT C COMPUTER, P843
  • [7] Analysis and improvement of a chaos-based Hash function construction
    Deng, Shaojiang
    Li, Yantao
    Xiao, Di
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (05) : 1338 - 1347
  • [8] Feng J., 2018, IEEE T DEPEND SECURE, V1, P99
  • [9] Cryptographic hashing using chaotic hydrodynamics
    Gilpin, William
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2018, 115 (19) : 4869 - 4874
  • [10] Hash key-based image encryption using crossover operator and chaos
    Guesmi, Ramzi
    Ben Farah, Mohamed Amine
    Kachouri, Abdennaceur
    Samet, Mounir
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4753 - 4769