One-Way Hash Function Based on Delay-Induced Hyperchaos

A scheme for constructing one-way Hash function based on hyperchaos induced by time delay and key-stream function iteration is proposed in this paper. In this scheme, the plaintext and secret key a...

[1]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[2]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[3]  Mohammad Ghebleh,et al.  A structure-based chaotic hashing scheme , 2015, Nonlinear Dynamics.

[4]  Xiang Li,et al.  A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.

[5]  H. Ren,et al.  Heteroclinic orbits in Chen circuit with time delay , 2010 .

[6]  Shahram Jamali,et al.  A novel keyed parallel hashing scheme based on a new chaotic system , 2016 .

[7]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[8]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[9]  Tzung-Her Chen,et al.  Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes , 2015, Signal Process. Image Commun..

[10]  Celso Grebogi,et al.  Dynamics of delay induced composite multi-scroll attractor and its application in encryption , 2017 .

[11]  Liu Ding,et al.  Anticontrol of chaos via direct time delay feedback , 2006 .

[12]  Zhen Ji,et al.  Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[13]  Xiaofeng Liao,et al.  Design of image Hash functions based on fluid dynamics model , 2012 .

[14]  Yantao Li,et al.  Chaotic hash function based on circular shifts with variable parameters , 2016 .

[15]  Ali Kanso,et al.  A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..

[16]  Florian Mendel,et al.  Improving Local Collisions: New Attacks on Reduced SHA-256 , 2013, EUROCRYPT.

[17]  Yong Wang,et al.  Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .

[18]  L. Cardoza-Avendaño,et al.  A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.

[19]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[20]  Bernie Sin-Hung Kwok,et al.  An efficient diffusion approach for chaos-based image encryption , 2009 .

[21]  Guoyuan Qi,et al.  A four-wing hyper-chaotic attractor and transient chaos generated from a new 4-D quadratic autonomous system , 2010 .

[22]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[23]  Hans Dobbertin Cryptanalysis of MD4 , 1996, FSE.

[24]  Morteza Dardel,et al.  Vibration control of a nonlinear beam with a nonlinear energy sink , 2016 .

[25]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[26]  Amir Akhavan,et al.  Parallel chaotic hash function based on the shuffle-exchange network , 2015 .

[27]  Jun-jie Chen,et al.  A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.

[28]  Rui Yang,et al.  Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption , 2016, Scientific Reports.

[29]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[30]  Shujun Li,et al.  Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.

[31]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[32]  Marc Stevens,et al.  New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis , 2013, EUROCRYPT.

[33]  Jinhu Lu,et al.  A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map , 2017, Int. J. Bifurc. Chaos.

[34]  Jongho Moon,et al.  Security enhanced multi-factor biometric authentication scheme using bio-hash function , 2017, PloS one.

[35]  Hui Chen,et al.  Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.

[36]  M. Baptista Cryptography with chaos , 1998 .

[37]  Bart Preneel,et al.  Construction of secure and fast hash functions using nonbinary error-correcting codes , 2002, IEEE Trans. Inf. Theory.