Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

被引:0
作者
Je Sen Teh
Moatsum Alawida
Jia Jie Ho
机构
[1] Universiti Sains Malaysia (USM),School of Computer Sciences
来源
Nonlinear Dynamics | 2020年 / 100卷
关键词
Digital chaotic map; Cryptography; Fixed-point arithmetic; Hash function; Sponge construction; Tent map;
D O I
暂无
中图分类号
学科分类号
摘要
Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a wide range of chaos-based hash functions in literature, most of them are designed in an ad hoc manner rather than relying on well-established design paradigms. In addition, they are commonly implemented using floating-point operations which are inefficient as compared to their bitwise counterparts. The combination of convoluted designs and floating-point representation also leads to hash functions that are difficult to analyze; therefore, claims of security cannot be verified easily. These issues are some of the reasons why chaos-based hash functions have not seen widespread use in practice. This paper proposes a new unkeyed hash function based on a chaotic sponge construction and fixed-point arithmetic to overcome the aforementioned problems. The use of a sponge construction provides provable security justifications, whereas the use of fixed-point arithmetic allows chaotic map operations to be implemented using bitwise operations. The combination of these design elements leads to a design that is both efficient and facilitates future cryptanalysis for security verification. Security and performance evaluations indicate that the proposed hash function has near-ideal diffusion, confusion, collision resistance, and distribution properties in addition to a hashing speed that is at least on par with the current state of the art in chaos-based hash functions.
引用
收藏
页码:713 / 729
页数:16
相关论文
共 144 条
  • [1] Abdoun N(2019)Design and security analysis of two robust keyed hash functions based on chaotic neural networks J. Ambient Intell. Humaniz. Comput. 8 13-2412
  • [2] Assad SE(2017)A simple secure hash function scheme using multiple chaotic maps 3D Research 42 2405-613
  • [3] Deforges O(2018)Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system Int. J. Inf. Technol. 96 601-2421
  • [4] Assaf R(2009)Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps Chaos Solitons Fractals 98 2403-266
  • [5] Khalil M(2019)Enhancing unimodal digital chaotic maps through hybridisation Nonlinear Dyn. 164 249-322
  • [6] Ahmad M(2019)Deterministic chaotic finite-state automata Nonlinear Dyn. 96 301-2993
  • [7] Khurana S(2019)An image encryption scheme based on hybridizing digital chaos and finite state machine Sig. Process. 94 2979-185
  • [8] Singh S(2019)Medical image cipher using hierarchical diffusion and non-sequential encryption Nonlinear Dyn. 5 179-3206
  • [9] AlSharari HD(2018)Parameter estimation for 1d PWL chaotic maps using noisy dynamics Nonlinear Dyn. 373 3201-8674
  • [10] Ahmad M(2015)SHA-3 standard: Permutation-based hash and extendable-output functions Tech. Rep. 7 8660-2721