Secure Hash Algorithm based on Efficient Chaotic Neural Network

Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology based on Chaotic Neural Networks is used to design Hash functions due to the following important properties of Chaos and Neural Networks: non-linearity, compression, confusion and diffusion. Compared to existing Hash functions based on Chaotic Neural Networks, the proposed structure integrates a strong Chaotic generator into neurons instead of using simple Chaotic maps. In fact, simple chaotic maps are not very robust, even against some statistical attacks (Uniformity and NIST). To also reduce the complexity of hash function proposed in ICITST conference (2015), while maintaining strength, we present in this paper a new structure of Hash function. The theoretical analysis and the obtained experimental performances demonstrate the efficiency o f the implemented structure in terms of strong Collision Resistance and High Message Sensitivity compared to SHA-2 and some Chaos-based Hash functions.

[1]  Di Xiao,et al.  A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.

[2]  Olivier Déforges,et al.  Chaos-based cryptosystems using dependent diffusion: An overview , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[3]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[4]  Olivier Déforges,et al.  Hash function based on efficient Chaotic Neural Network , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[5]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[6]  Zhongquan Huang A more secure parallel keyed hash function based on chaotic neural network , 2011 .

[7]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[8]  He Bo,et al.  A method for designing Hash function based on chaotic neural network , 2013, CloudCom 2013.

[9]  Imad Fakhri Taha Alshaikhli,et al.  Broad View of Cryptographic Hash Functions , 2013 .

[10]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[11]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[12]  Ilya Mironov,et al.  Hash functions: Theory, attacks, and applications , 2005 .

[13]  Safwan El Assad,et al.  Efficient multicore implementation of an advanced generator of discrete chaotic sequences , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[14]  Safwan El Assad,et al.  Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.