A secure hash function based on sponge construction and chaos-maps

被引:4
作者
Amine, Zellagui [1 ]
Naima, Hadj-Said [1 ]
Ali-Pacha, Adda [1 ]
机构
[1] USTO MB, Lab Coding & Secur Informat LACOSI, POB 1505, El Mnaouer Oran 31000, Algeria
关键词
PWLCM; hash function; chaotic maps; sponge construction; cloud computing; collision; password; BLOCKCHAIN TECHNOLOGY; AUTHENTICATION; SCHEME;
D O I
10.1504/IJCSE.2022.123116
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgard construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash function consists of three phases: message processing, absorbing and squeezing. In the message processing phase, the message is divided into n blocks, each block is processed by a standard chaotic map, then the absorbing phase takes the result of the message as input and generates a new output sequence using the PWLCM chaotic map, this process being repeated until all blocks of the message are processed. The final hash value is generated by the squeezing phase. The theoretical and experimental analysis shows that the proposed hash function has good statistical properties, high resistance to collision attacks, high sensitivity to any small change in the control parameter and message, and can be easily implemented and used for digital signatures, data management and password hashing in cloud computing.
引用
收藏
页码:285 / 297
页数:13
相关论文
共 47 条
[1]   A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps [J].
Ahmad, Musheer ;
Khurana, Shruti ;
Singh, Sushmita ;
AlSharari, Hamed D. .
3D Research, 2017, 8 (02)
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   Chaos-based hash function (CBHF) for cryptographic applications [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
El-Latif, Ahmed A. Abd .
CHAOS SOLITONS & FRACTALS, 2009, 42 (02) :767-772
[4]  
Amine Z., 2021, COMMUNICATION SCI TE, V17, P13
[5]  
[Anonymous], 2004, Cryptol. ePrint Arch., Tech. Rep. 2004/199
[6]   A new encrypted image retrieval method based on feature fusion in cloud computing [J].
Chen, Jianhua ;
Qin, Jiaohua ;
Xiang, Xuyu ;
Tan, Yun .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (01) :114-123
[7]   Review on blockchain technology and its application to the simple analysis of intellectual property protection [J].
Chen, Wei ;
Zhou, Kun ;
Fang, Weidong ;
Wang, Ke ;
Bi, Fangming ;
Assefa, Biruk .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (04) :437-444
[8]   Using RFID technology to develop an intelligent equipment lock management system [J].
Chen, Yeh-Cheng ;
Chen, Ruey-Shun ;
Sun, Hung-Min ;
Wu, S. Felix .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (02) :157-165
[9]   A novel keyed parallel hashing scheme based on a new chaotic system [J].
Chenaghlu, Meysam Asgari ;
Jamali, Shahram ;
Khasmakhi, Narjes Nikzad .
CHAOS SOLITONS & FRACTALS, 2016, 87 :216-225
[10]  
Chirikov B.V, 1971, PREPR 267, V31