Parallel Hash function construction based on chaotic maps with changeable parameters

A parallel Hash algorithm construction based on chaotic maps with changeable parameters is proposed and analyzed in this paper. The two main characteristics of the proposed algorithm are parallel processing mode and message expansion. The algorithm translates the expanded message blocks into the corresponding ASCII code values as the iteration times, iterates the chaotic asymmetric tent map and then the chaotic piecewise linear map, continuously, with changeable parameters dynamically obtained from the position index of the corresponding message blocks, to generate decimal fractions, then rounds the decimal fractions to integers, and finally cascades these integers to construct intermediate Hash value. Final Hash value with the length of 128-bit is generated by logical XOR operation of intermediate Hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm satisfies the performance requirements of a secure Hash function.

[1]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[2]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[3]  Di Xiao,et al.  Hash Function Construction Based on the Chaotic Look-Up Table with Changeable Parameter , 2011 .

[4]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[5]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[6]  Kwok-Wo Wong,et al.  One-way hash function construction based on chaotic map network , 2009 .

[7]  Xiaofeng Liao,et al.  Parallel keyed hash function construction based on chaotic maps , 2008 .

[8]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[9]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[10]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[11]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[12]  Chang Nian Zhang,et al.  A systematic approach for encryption and authentication with fault tolerance , 2004, Comput. Networks.

[13]  Kwok-Wo Wong,et al.  Improving the security of a dynamic look-up table based chaotic cryptosystem , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[14]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[15]  M. Baptista Cryptography with chaos , 1998 .

[16]  Di Xiao,et al.  A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.