2005
DOI: 10.1142/s0218127405014489
|View full text |Cite
|
Sign up to set email alerts
|

A Chaos-Based Cryptographic Hash Function for Message Authentication

Abstract: In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length. The compression function in-use is developed according to the diffusion and confusion properties of a novel high-dimensional discrete chaotic map. A symmetric key structure can also be easily embedded based on the high sensitivity to initial conditions and system parameters of the map. As demonstrated in experiments, the th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 2 publications
0
18
0
Order By: Relevance
“…In recent years, there has been a considerable advance in the construction of one-way hash functions based on chaotic maps, including 1D piecewise linear/nonlinear chaotic map [27,28], 2D nonlinear piecewise linear chaotic map [29], high-dimensional chaotic map [30], chaotic neural networks [31], hyper chaos [32], and chaos S-Box [33], which indicates extensive effort in constructing hash functions based on different new methods although some of these new algorithms have been proven to be insecure [22,[34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, there has been a considerable advance in the construction of one-way hash functions based on chaotic maps, including 1D piecewise linear/nonlinear chaotic map [27,28], 2D nonlinear piecewise linear chaotic map [29], high-dimensional chaotic map [30], chaotic neural networks [31], hyper chaos [32], and chaos S-Box [33], which indicates extensive effort in constructing hash functions based on different new methods although some of these new algorithms have been proven to be insecure [22,[34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
“…These properties granted them to be a good candidate for secure communications. To the best of our knowledge, only a few chaos-based hash functions with high-dimensional dynamical systems have been reported http://asp.eurasipjournals.com/content/2013/1/126 [30,32,38]. For instance, an algorithm for image encryption based on a high-dimensional chaotic map with high efficiency is proposed in [4].…”
Section: Introductionmentioning
confidence: 99%
“…In the proposed algorithm of [9], two-dimensional and four-dimensional Cat Chaotic Maps ( ) CATCM are utilized. Two-dimensional generalized CATCM is defined as:…”
Section: Typical Algorithm Threementioning
confidence: 99%
“…According to the performance data provided in [9], this algorithm can generally meet the performance requirement of hash function. But 1-bit change in message leads to only 58.353-bit change in the 128-bit final hash value, which is far from the ideal number 64-bit.…”
Section: The Performance Analysis and Improvementmentioning
confidence: 99%
“…Hash function is a fundamental building block of information security and plays an important role in integrity protection, message authentication [1] and digital signature [2]. It is a one-way and compression function that maps an arbitrary length message to a fixed length value.…”
Section: Introductionmentioning
confidence: 99%