A novel combined cryptographic and hash algorithm based on chaotic control character

Abstract A novel combined cryptographic and hash algorithm based on chaotic control character is proposed in this paper. The control character is generated by chaotic iteration. The plaintext is pre-processed in terms of control character, and then encrypted by the look-up index table. At the same time, the chaotic trajectory is changed continuously according to the control character, which can avoid the dynamical degradation of chaos. Besides, the look-up index table is updated by utilizing the control character continuously, and the index item of the final look-up index table can be considered as the hash value of the whole paragraph of plaintext. Therefore, the proposed algorithm can perform both encryption/decryption and hash in a combined manner. Compared with Wong’s and our former algorithms, the proposed one has decreased the ratio of ciphertext/plaintext to 1, and improved the efficiency greatly. Theoretical analysis and computer simulation verify the validity of the proposed algorithm.

[1]  Kwok-Wo Wong,et al.  Improving the security of a dynamic look-up table based chaotic cryptosystem , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[2]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[3]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[4]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[5]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[6]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[7]  Zhiliang Zhu,et al.  Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[8]  Tao Xiang,et al.  An improved chaotic cryptosystem with external key , 2008 .

[9]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[10]  William E. Burr A New Hash Competition , 2008, IEEE Security & Privacy Magazine.

[11]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[12]  Liu Fen-lin Chaotic encryption scheme based on control character , 2007 .

[13]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[14]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[15]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[16]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.