Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations

Security of information transmitted through the Internet is an international concern. This security is guaranteed by tools like hash functions. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital media must be investigated. In this document an original keyed hash function is evaluated. It is based on chaotic iterations and thus possesses various topological properties as uniform repartition and sensibility to its initial condition. These properties make our hash function satisfy the requirements in this field. This claim is verified qualitatively and experimentally in this research work, among other things by realizing simulations of diffusion and confusion.

[1]  Jacques M. Bahi,et al.  Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  W. Xiaomin,et al.  One way Hash function construction based on the extended chaotic maps switch , 2003 .

[3]  Jacques M. Bahi,et al.  An Improved Watermarking Scheme for Internet Applications , 2010, 2010 2nd International Conference on Evolving Internet.

[4]  Josef Pieprzyk,et al.  Keyed Hash Functions , 1995, Cryptography: Policy and Algorithms.

[5]  Wei Guo,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .

[6]  Jacques M. Bahi,et al.  Randomness Quality of CI Chaotic Generators: Applications to Internet Security , 2010, 2010 2nd International Conference on Evolving Internet.

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Yong Wang,et al.  Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .

[9]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[10]  Chang-song Zhou,et al.  Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .

[11]  Christophe Guyeux,et al.  An improved watermarking algorithm for Internet applications , 2010 .

[12]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[13]  Xiaofeng Liao,et al.  A chaos-based hash function with both modification detection and localization capabilities , 2010 .

[14]  Carsten Knudsen,et al.  Chaos Without Nonperiodicity , 1994 .

[15]  M. Bernhard Introduction to Chaotic Dynamical Systems , 1992 .

[16]  Christophe Guyeux,et al.  Le désordre des itérations chaotiques et leur utilité en sécurité informatique. (The disorder of chaotic iterations and its use in the computer science security field) , 2010 .