Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system

In this paper, a hash generation scheme by exploring the complex dynamics of nonlinear system is proposed. The security of anticipated hashing scheme has been complemented by exploring the complex dynamics of 4D bounded nonlinear system exhibiting hyperchaotic nature, the strength of generated hashes is proven using statistical analysis. The proposed scheme is testified to possess characteristics of a hash function such as sensitivity to initial parameters and message, one-way property, uniform distribution of hashes, and resistance to attacks. The scheme is robust, flexible and efficient for usages in real world cryptographic scenarios. Although, performance tests have been performed for 128-bit hash but the scheme can practically be employed in any standard network security protocols for generating hashes of any desired length.

[1]  Antoine Joux,et al.  Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.

[2]  A. Akhavan,et al.  Hash function based on piecewise nonlinear chaotic map , 2009 .

[3]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[4]  Musheer Ahmad,et al.  Chaotic hash function based plain-image dependent block ciphering technique , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[5]  M. Jafarizadeh,et al.  Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps , 2009 .

[6]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[7]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[8]  Zhang Han,et al.  One way Hash function construction based on spatiotemporal chaos , 2005 .

[9]  K. Murali,et al.  Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.

[10]  Wansheng Tang,et al.  A novel bounded 4D chaotic system , 2012 .

[11]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[12]  Amir Akhavan,et al.  A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.

[13]  Ali Kanso,et al.  A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..

[14]  Wallace Kit-Sang Tang,et al.  A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.

[15]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[16]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[17]  Zhi-Hong Guan,et al.  A novel digital watermark algorithm based on chaotic maps , 2007 .

[18]  Mahmoud Maqableh,et al.  New Hash Function Based on Chaos Theory (CHA-1) , 2008 .

[19]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[20]  Li,et al.  Secure hash function based on chaotic tent map with changeable parameter , 2012 .

[21]  Xuejia Lai,et al.  Improved Collision Attack on Hash Function MD5 , 2007, Journal of Computer Science and Technology.

[22]  Musheer Ahmad,et al.  Designing Chaotic Chirikov Map-Based Secure Hash Function , 2016 .

[23]  Stefan Lucks,et al.  Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..

[24]  Yong Wang,et al.  A novel method for one-way hash function construction based on spatiotemporal chaos , 2009 .

[25]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[26]  Xiang Li,et al.  A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.

[27]  Ali Adnan Al-Temeemy The Development of a 3D LADAR Simulator Based on a Fast Target Impulse Response Generation Approach , 2017 .

[28]  Ningning Yang,et al.  A novel fractional-order hyperchaotic system stabilization via fractional sliding-mode control , 2013 .

[29]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[30]  Amir Akhavan,et al.  Parallel chaotic hash function based on the shuffle-exchange network , 2015 .

[31]  Ralph C. Merkle,et al.  One Way Hash Functions and DES , 1989, CRYPTO.

[32]  Wen-Chung Kuo,et al.  A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.

[33]  Christophe Guyeux,et al.  On the use of chaotic iterations to design keyed hash function , 2017, Cluster Computing.

[34]  Xiaofeng Liao,et al.  Chaos Based Hash Function , 2011, Chaos-Based Cryptography.

[35]  Musheer Ahmad,et al.  A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps , 2017 .

[36]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[37]  Bruce Schneier,et al.  Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..

[38]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[39]  Yevgeniy Dodis,et al.  New Design Criteria for Hash Functions and Block Ciphers , 2007 .

[40]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[41]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[42]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[43]  Ljupco Kocarev,et al.  Intelligent Computing Based on Chaos , 2009 .

[44]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[45]  Antoine Joux,et al.  Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.

[46]  Di Xiao,et al.  Improvement and performance analysis of a novel hash function based on chaotic neural network , 2011, Neural Computing and Applications.