2016
DOI: 10.1007/s11071-016-2652-1
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic hash function based on the dynamic S-Box with variable parameters

Abstract: We present a chaotic hash function based on the dynamic S-Box with variable parameters in this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four initial buffers and an initial hash value. Then, we divide a randomly chosen message into message blocks and assign the four buffers and current message block to a transfer function to produce variable parameters and initial values of the PWLCM and logistic map for constructing a dynamic S-Box, which is then used for updating t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 47 publications
0
19
0
Order By: Relevance
“…Li et al [26] used a dynamic S-box to design a chaotic hash function that produces 128-bit hash values as the final hash code and thus compromising its practicability and flexibility lent via the S-box. One major drawback of this proposed algorithm is that the length of the hash code is not enough to guarantee security against collision or second preimage attacks.…”
Section: Discussionmentioning
confidence: 99%
“…Li et al [26] used a dynamic S-box to design a chaotic hash function that produces 128-bit hash values as the final hash code and thus compromising its practicability and flexibility lent via the S-box. One major drawback of this proposed algorithm is that the length of the hash code is not enough to guarantee security against collision or second preimage attacks.…”
Section: Discussionmentioning
confidence: 99%
“…Birthday attack is an algorithm-independent attack, where a set of random messages are inspected for a possible pair of messages whose hash values collide [49,50]. For an h-bit hash function, the complexity of this attack is about 2 .…”
Section: 41birthday and Meet-in-the-middle Attacksmentioning
confidence: 99%
“…The ideal mean value of the absolute difference for 128-bit hash value is equal to 1360, while our mean value is 1253. [18,34,38,43,49,52,53] in Table 4. As shown in Table 4, the average compression speed of the proposed algorithm (132.07 Mbps) is higher than SHA-1 (114.45 Mbps) and is very close to MD5 (132.10 Mbps).…”
Section: Collision Testsmentioning
confidence: 99%
“…Teh et al [13] designed a keyed hash function based on the logistic map with fixed point representation. Li et al designed four 128-bit parallel hash functions based on cross-coupled map lattices [14], tent map [15], circular shifts [16], and dynamic S-box [17] with varying parameters.…”
Section: Introductionmentioning
confidence: 99%