A chaos-based hash function with both modification detection and localization capabilities

Abstract Recently, a variety of chaos-based hash functions have been proposed. Nevertheless, none of them can realize modification localization. In this paper, a hash function with both modification detection and localization capabilities is proposed, which can also support the parallel processing mode. By using the mechanism of changeable-parameter and self-synchronization, the keystream can establish a close relation with the algorithm key, the content, and the order of each message unit. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash functions.

[1]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[2]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Tao Xiang,et al.  An improved chaotic cryptosystem with external key , 2008 .

[5]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[6]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[7]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[10]  Zhiliang Zhu,et al.  Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[11]  V. Lakshmi Praba,et al.  Study of chaos functions for their suitability in generating Message Authentication Codes , 2007, Appl. Soft Comput..

[12]  David Goldberg,et al.  What every computer scientist should know about floating-point arithmetic , 1991, CSUR.

[13]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[14]  Kwok-Wo Wong,et al.  Improving the security of a dynamic look-up table based chaotic cryptosystem , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[15]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[16]  A. Baranovsky,et al.  DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES , 1995 .