New keyed chaotic neural network hash function based on sponge construction

This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.

[1]  Guido Bertoni,et al.  Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..

[2]  Mohamad Khalil,et al.  Secure Hash Algorithm based on Efficient Chaotic Neural Network , 2016, 2016 International Conference on Communications (COMM).

[3]  Marc Stevens Attacks on Hash Functions and Applications , 2012 .

[4]  Olivier Déforges,et al.  Hash function based on efficient Chaotic Neural Network , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[5]  Willi Meier,et al.  Quark: A Lightweight Hash , 2010, Journal of Cryptology.

[6]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[7]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[8]  Safwan El Assad,et al.  Design and efficient implementation of a chaos-based stream cipher , 2017 .

[9]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.