Analysis and improvement of a chaos-based Hash function construction

Abstract The construction of a new Hash function attracts much attention recently. In Kwok and Tang (2005) [Kwok HS, Tang WKS. A chaos-based cryptographic Hash function for message authentication. Int J Bifurcat Chaos 2005;15:4043–50], a chaos-based Hash function has been proposed. In this paper, the potential flaws in the original algorithm are analyzed in detail, and then the corresponding improving measures are proposed. We enhance the influence that each bit of the final Hash value is closely related to all the bits of the message or key and a single bit change in message or key results in great changes in the final Hash value. Simulation results show that the proposed improving algorithm has strong diffusion and confusion capability, good collision resistance, extreme sensitivity to message and secret key.

[1]  Kwok-Wo Wong,et al.  Improving the security of a dynamic look-up table based chaotic cryptosystem , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  Wallace Kit-Sang Tang,et al.  A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.

[5]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[6]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[7]  Di Xiao,et al.  A novel combined cryptographic and hash algorithm based on chaotic control character , 2009 .

[8]  Long Min,et al.  One-way Hash function construction based on two-dimensional hyper-chaotic mappings , 2005 .

[9]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[10]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[11]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[12]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[13]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[14]  Wang Zhi-quan,et al.  One-way Hash function based on chaotic neural network , 2006 .

[15]  Xiaofeng Liao,et al.  Parallel keyed hash function construction based on chaotic maps , 2008 .

[16]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[17]  Sheng Li-Yuan,et al.  One-way Hash function construction based on tangent-delay ellipse reflecting cavity-map system , 2006 .