Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First, the input message is divided into four 1D arrays, to generate four perturbation sequences via parameter updating rule, the perturbed parameters are still within their significant intervals, to make the system remain a hyperchaotic state. Each iteration of the discrete hyperchaotic system uses updated parameters, and the last state variable values are extracted to generate a len-bit hash value by transformation algorithm. The algorithm is so flexible that it can generate 256, 512, 1024 or longer hash value through parameter switcher. The experimental evaluation and comparison demonstrated the hash function’s resistance to differential attack and second pre-image attack. The proposed hash function can be applied in the identification, information integrity, and figure signature.

[1]  Hegui Zhu,et al.  Analyzing Devaney Chaos of a Sine-Cosine Compound Function System , 2018, Int. J. Bifurc. Chaos.

[2]  Krishna Asawa,et al.  Building a 256-bit hash function on a stronger MD variant , 2014, Central European Journal of Computer Science.

[3]  Zhiliang Zhu,et al.  An image encryption algorithm based on compound homogeneous hyper-chaotic system , 2017, Nonlinear Dynamics.

[4]  Xianghong Li,et al.  Bursting phenomenon in a piecewise mechanical system with parameter perturbation in stiffness , 2016 .

[5]  Xiang Li,et al.  A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.

[6]  Xingyuan Wang,et al.  A hyperchaos generated from Lorenz system , 2008 .

[7]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[8]  Wang Xing-Yuan,et al.  Modified function projective lag synchronization in fractional-order chaotic (hyperchaotic) systems , 2014 .

[9]  Dawen Xia,et al.  Chaotic hash function based on the dynamic S-Box with variable parameters , 2016, Nonlinear Dynamics.

[10]  G. Geetha,et al.  Cryptographic Hash Functions: A Review , 2012 .

[11]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[12]  Ali Kanso,et al.  A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..

[13]  Luo Chao,et al.  Hybrid Delayed Synchronizations of Complex Chaotic Systems in Modulus-Phase Spaces and Its Application , 2016 .

[14]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[15]  Qiang Jia,et al.  Hyperchaos generated from the Lorenz chaotic system and its control , 2007 .

[16]  Xing-Yuan Wang,et al.  A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice , 2014, Inf. Sci..

[17]  Musheer Ahmad,et al.  Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system , 2018, International Journal of Information Technology.

[18]  Xing-Yuan Wang,et al.  A new image encryption algorithm based on non-adjacent coupled map lattices , 2015, Appl. Soft Comput..

[19]  Naveen K. Nishchal,et al.  An optical Hash function construction based on equal modulus decomposition for authentication verification , 2018, Optics Communications.

[20]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[21]  Xingyuan Wang,et al.  Chaos in the fractional-order complex Lorenz system and its synchronization , 2013 .

[22]  Kaijun Tan,et al.  A chaos-based keyed hash function based on fixed point representation , 2018, Cluster Computing.

[23]  Musheer Ahmad,et al.  A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps , 2017 .

[24]  Abdurahman Kadir,et al.  Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections , 2017 .

[25]  Dag Arne Osvik,et al.  MD5 considered harmful today, creating a rogue CA certificate , 2008 .

[26]  S. Santhanalakshmi,et al.  Design of secure Cryptographic hash function using soft computing techniques , 2017 .

[27]  Daniel Smith-Tone,et al.  Report on Post-Quantum Cryptography , 2016 .