Design and security analysis of two robust keyed hash functions based on chaotic neural networks

In this paper, we designed, implemented, and analyzed the performance, in terms of security and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on Merkle–D $$\mathring{\rm a}$$ a ˚ mgard (MD) construction with three output schemes: CNN-Matyas–Meyer–Oseas, Modified CNN-Matyas–Meyer–Oseas, and CNN-Miyaguchi–Preneel. The first hash function’s structure is composed of two-layer chaotic neural network while the structure of the second hash function is formed of one-layer chaotic neural network followed by non-linear layer functions. The obtained results of several statistical tests and cryptanalytic analysis highlight the robustness of the proposed keyed CNN hash functions, which is fundamentally due to the strong non-linearity of both the chaotic systems and the neural networks. The comparison of the performance analysis with some chaos-based hash functions of the literature and with standard hash functions make the proposed hash functions suitable for data integrity, message authentication, and digital signature applications.

[1]  Xiaofeng Liao,et al.  Parallel keyed hash function construction based on chaotic maps , 2008 .

[2]  A. Akhavan,et al.  Hash function based on piecewise nonlinear chaotic map , 2009 .

[3]  Di Xiao,et al.  A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.

[4]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[5]  Di Xiao,et al.  Parallel chaotic Hash function construction based on cellular neural network , 2011, Neural Computing and Applications.

[6]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[7]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[8]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[9]  W. San-Um,et al.  A topologically simple keyed hash function based on circular chaotic sinusoidal map network , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[10]  Yong Wang,et al.  Parallel hash function construction based on coupled map lattices , 2011 .

[11]  Joos Vandewalle,et al.  Collision-free hashfunctions based on blockcipher algorithms , 1989, Proceedings. International Carnahan Conference on Security Technology.

[12]  Zhongquan Huang A more secure parallel keyed hash function based on chaotic neural network , 2011 .

[13]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[14]  Wen-Chung Kuo,et al.  A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.

[15]  Ahmed A. Abd El-Latif,et al.  Chaos-based hash function (CBHF) for cryptographic applications , 2009 .

[16]  Abdennaceur Kachouri,et al.  A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 , 2015, Nonlinear Dynamics.

[17]  Kazuo Ohta,et al.  Confirmation that Some Hash Functions Are Not Collision Free , 1991, EUROCRYPT.

[18]  Ki-Ryong Kwon,et al.  Polyline curvatures based robust vector data hashing , 2013, Multimedia Tools and Applications.

[19]  Mahmoud Maqableh,et al.  New Hash Function Based on Chaos Theory (CHA-1) , 2008 .

[20]  Philippe Flajolet,et al.  Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-Organizing Search , 1992, Discret. Appl. Math..

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Shiguo Lian,et al.  Hash function based on chaotic neural networks , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[23]  Yu Sasaki,et al.  Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.

[24]  Sung-Bong Jang,et al.  File similarity evaluation scheme for multimedia data using partial hash information , 2016, Multimedia Tools and Applications.

[25]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[26]  H. Feistel Cryptography and Computer Privacy , 1973 .

[27]  Mohamad Khalil,et al.  Secure Hash Algorithm based on Efficient Chaotic Neural Network , 2016, 2016 International Conference on Communications (COMM).

[28]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[29]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .

[30]  Xiangdong Liu,et al.  Hysteresis modeling based on the hysteretic chaotic neural network , 2008, Neural Computing and Applications.

[31]  Zhang Jia-Shu,et al.  Keyed one-way Hash function construction based on the chaotic dynamic S-Box , 2006 .

[32]  Pieter Retief Kasselman,et al.  Analysis and design of cryptographic hash functions , 1999 .

[33]  Hongjun Wu,et al.  Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) , 2011, ACISP.

[34]  Mridul Nandi,et al.  Speeding Up the Wide-Pipe: Secure and Fast Hashing , 2010, INDOCRYPT.

[35]  Di Xiao,et al.  Improvement and performance analysis of a novel hash function based on chaotic neural network , 2011, Neural Computing and Applications.

[36]  Kai Yang,et al.  A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System , 2012, J. Comput..

[37]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[38]  Xiaofeng Liao,et al.  A chaos-based hash function with both modification detection and localization capabilities , 2010 .

[39]  Joos Vandewalle,et al.  Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.

[40]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[41]  Amir Akhavan,et al.  Parallel chaotic hash function based on the shuffle-exchange network , 2015 .

[42]  Di Xiao,et al.  A novel combined cryptographic and hash algorithm based on chaotic control character , 2009 .

[43]  Huaxiong Wang,et al.  Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 , 2010, ASIACRYPT.

[44]  Hai Yu,et al.  One-Way Hash Function Construction Based on Chaotic Coupled Map Network , 2011, 2011 Fourth International Workshop on Chaos-Fractals Theories and Applications.

[45]  Li,et al.  Secure hash function based on chaotic tent map with changeable parameter , 2012 .

[46]  Jian Guo,et al.  Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..

[47]  Yu Sasaki,et al.  Improved Preimage Attack for 68-Step HAS-160 , 2009, ICISC.

[48]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[49]  Yu Sasaki,et al.  Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.

[50]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[51]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[52]  Kwok-Wo Wong,et al.  One-way hash function construction based on chaotic map network , 2009 .

[53]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[54]  Yu Sasaki,et al.  Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.

[55]  Stefan Lucks,et al.  Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..

[56]  Yong Wang,et al.  A novel method for one-way hash function construction based on spatiotemporal chaos , 2009 .

[57]  A. Ramezani,et al.  A dynamic chaotic hash function based upon circle chord methods , 2012, 6th International Symposium on Telecommunications (IST).

[58]  Bart Preneel,et al.  On the Security of Two MAC Algorithms , 1996, EUROCRYPT.

[59]  Yu Sasaki,et al.  Preimage Attacks on 3, 4, and 5-Pass HAVAL , 2008, ASIACRYPT.

[60]  Xiaofeng Liao,et al.  A Combined Hash and Encryption Scheme by Chaotic Neural Network , 2004, ISNN.

[61]  Sk Hafizul Islam,et al.  Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .

[62]  Amir Akhavan,et al.  A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.

[63]  Hefei Ling,et al.  Local and global structure preserving hashing for fast digital fingerprint tracing , 2014, Multimedia Tools and Applications.

[64]  Di Xiao,et al.  Keyed hash function based on a dynamic lookup table of functions , 2012, Inf. Sci..

[65]  Yong Wang,et al.  One-Way Hash Function Construction Based on Iterating a Chaotic Map , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[66]  Yong Wang,et al.  Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .

[67]  Qi Han,et al.  Parallel Hash function construction based on chaotic maps with changeable parameters , 2011, Neural Computing and Applications.

[68]  Zhang Han,et al.  One way Hash function construction based on spatiotemporal chaos , 2005 .

[69]  Ilya Mironov,et al.  Hash functions: Theory, attacks, and applications , 2005 .

[70]  V. Lakshmi Praba,et al.  Study of chaos functions for their suitability in generating Message Authentication Codes , 2007, Appl. Soft Comput..

[71]  Wallace Kit-Sang Tang,et al.  A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.

[72]  Safwan El Assad,et al.  Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[73]  Han Zhang,et al.  One-way Hash Function Construction Based on Conservative Chaotic Systems , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[74]  Yu-Ling Luo,et al.  One-way hash function construction based on the spatiotemporal chaotic system , 2012 .

[75]  Safwan El Assad,et al.  Efficient multicore implementation of an advanced generator of discrete chaotic sequences , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[76]  Shahram Jamali,et al.  A novel keyed parallel hashing scheme based on a new chaotic system , 2016 .

[77]  Olivier Déforges,et al.  Hash function based on efficient Chaotic Neural Network , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).