An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack

In this paper, the chaos-based hash function is analyzed, then an improved version of chaos-based hash function is presented and discussed using chaotic neural networks. It is based on the piecewise linear chaotic map that is used as a transfer function in the input and output of the neural network layer. The security of the improved hash function is also discussed and a novel type of collision resistant hash function called semi-collision attack is proposed, which is based on the collision percentage between the two hash values. In the proposed attack particle swarm optimization algorithm is used to define the fitness function parameters. Finally, numerical and simulation results provides strong collision resistance and high performance efficiency.

[1]  Shihong Wang,et al.  Collision analysis of a chaos-based hash function with both modification detection and localization capability , 2012 .

[2]  Boris S. Mordukhovich,et al.  Optimal boundary control of hyperbolic equations with pointwise state constraints , 2005 .

[3]  Ajith Abraham,et al.  Artificial Neural Networks , 2005 .

[4]  Xiaofeng Liao,et al.  Parallel keyed hash function construction based on chaotic maps , 2008 .

[5]  Cathy H. Wu Artificial Neural Networks for Molecular Sequence Analysis , 1997, Comput. Chem..

[6]  M. N. Vrahatis,et al.  Evolutionary computation based cryptanalysis: A first study , 2005 .

[7]  Ajith Abraham,et al.  Known-plaintext attack of DES-16 using Particle Swarm Optimization , 2011, 2011 Third World Congress on Nature and Biologically Inspired Computing.

[8]  Ajith Abraham,et al.  Artificial neural networks , 2005 .

[9]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[10]  Wei Guo,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .

[11]  Qi Han,et al.  Parallel Hash function construction based on chaotic maps with changeable parameters , 2011, Neural Computing and Applications.

[12]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[13]  Enes Pasalic,et al.  Collisions for variants of the BLAKE hash function , 2010, Inf. Process. Lett..

[14]  Farrukh Aslam Khan,et al.  Cryptanalysis of four-rounded DES using binary particle swarm optimization , 2009, GECCO '09.

[15]  Xing-Yuan Wang,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic neural network , 2010, Neurocomputing.

[16]  Yong Wang,et al.  Parallel hash function construction based on coupled map lattices , 2011 .

[17]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.