2009
DOI: 10.1016/j.physleta.2009.07.016
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis on a parallel keyed hash function based on chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…This operation lets the attackers use the privilege of communicative law and practice forgery attack on the hash function. Some of these algorithms are broken by forgery attack [37]. Not only does the proposed algorithm process the whole message from two sides (which leads to high complexity in mixture), but also in the final step, instead of a simple XOR operation, a conditional method is used in order to resist forgery attack in any section of the algorithm.…”
Section: Resistance Of Forgery Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…This operation lets the attackers use the privilege of communicative law and practice forgery attack on the hash function. Some of these algorithms are broken by forgery attack [37]. Not only does the proposed algorithm process the whole message from two sides (which leads to high complexity in mixture), but also in the final step, instead of a simple XOR operation, a conditional method is used in order to resist forgery attack in any section of the algorithm.…”
Section: Resistance Of Forgery Attacksmentioning
confidence: 99%
“…In recent years, there has been a considerable advance in the construction of one-way hash functions based on chaotic maps, including 1D piecewise linear/nonlinear chaotic map [27,28], 2D nonlinear piecewise linear chaotic map [29], high-dimensional chaotic map [30], chaotic neural networks [31], hyper chaos [32], and chaos S-Box [33], which indicates extensive effort in constructing hash functions based on different new methods although some of these new algorithms have been proven to be insecure [22,[34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
“…Many chaosbased image cryptosystems are proposed in this field recently [1]- [11]. However, some of them are successfully broken [12]- [17] due to their small key spaces and weakly secure encryption mechanisms. Among these weaknesses, the most serious one is that the key element used in cryptosystem completely depends on the secret key which means that the same key is used to encrypt different plain images.…”
Section: Introductionmentioning
confidence: 99%
“…Since these chaotic maps in cryptanalytic studies reveal security weakness [25][26][27][28][29][30][31][32], we present a chaotic hash function based on the dynamic S-Box (Substitution Box) with variable parameters that is composed of phases of parameter initialization, message processing and hash value generation in this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four 32-bit initial buffers and 128-bit initial hash value.…”
Section: Introductionmentioning
confidence: 99%