A novel parallel hash function based on 3D chaotic map

As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions. Nevertheless, the corresponding analysis of them lag far behind. In this paper, a new efficient scheme for parallel hash function based on high-dimensional chaotic map is proposed. In the proposed scheme, the confusion as well as the diffusion effect is enhanced significantly by utilizing two nonlinear coupling parameters. Theoretical and experimental results indicate that the proposed scheme can satisfy all performance requirements of hash function such as desired statistical properties and strong collision resistance. At the same time, the proposed scheme can keep the parallel merit and message sensitivity with high potential to be adopted for network security.

[1]  G. Winskel What Is Discrete Mathematics , 2007 .

[2]  A. Akhavan,et al.  Hash function based on piecewise nonlinear chaotic map , 2009 .

[3]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[4]  Amir Akhavan,et al.  Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.

[5]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[6]  Di Xiao,et al.  A novel combined cryptographic and hash algorithm based on chaotic control character , 2009 .

[7]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[8]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[9]  Zhongquan Huang A more secure parallel keyed hash function based on chaotic neural network , 2011 .

[10]  Amir Akhavan,et al.  A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.

[11]  Ahmed A. Abd El-Latif,et al.  Chaos-based hash function (CBHF) for cryptographic applications , 2009 .

[12]  Sasaki Yu,et al.  Improved Collision Attack on MD5 , 2005 .

[13]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[14]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[15]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[16]  Gilles Brassard,et al.  Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.

[17]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[18]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[19]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[20]  M. A. Jafarizadeh,et al.  Hierarchy of Chaotic Maps with an Invariant Measure , 2001 .

[21]  Wallace Kit-Sang Tang,et al.  A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.

[22]  Wei Guo,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .

[23]  Shujun Li,et al.  Analyses and New Designs of Digital Chaotic Ciphers , 2003 .

[24]  Wei Zhang,et al.  A Novel Hash Function Based on Hyperchaotic Lorenz System , 2009, ICFIE.

[25]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[26]  Yong Wang,et al.  Parallel hash function construction based on coupled map lattices , 2011 .

[27]  Babak Sadeghiyan,et al.  Finding the differential characteristics of block ciphers with neural networks , 2008, Inf. Sci..

[28]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[29]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[30]  Shiguo Lian,et al.  Hash function based on chaotic neural networks , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[31]  Di Xiao,et al.  Corrigendum to “Analysis and improvement of a chaos-based hash function construction” [Commun Nonlinear Sci Numer Simulat 2010;15:1338–1347] , 2010 .

[32]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[33]  Kwok-Wo Wong,et al.  One-way hash function construction based on chaotic map network , 2009 .

[34]  Xuejia Lai,et al.  Improved Collision Attack on Hash Function MD5 , 2007, Journal of Computer Science and Technology.

[35]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[36]  M. A. Jafarizadeh,et al.  Hierarchy of Chaotic Maps with an Invariant Measure and their Compositions , 2002 .

[37]  Dong Hoon Lee,et al.  EC2C-PAKA: An efficient client-to-client password-authenticated key agreement , 2007, Inf. Sci..

[38]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[39]  Zeger Karssen Zeger's second DOI Article , 2007 .

[40]  Long Min,et al.  One-way Hash function construction based on two-dimensional hyper-chaotic mappings , 2005 .

[41]  Zhang Han,et al.  One way Hash function construction based on spatiotemporal chaos , 2005 .

[42]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[43]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[44]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[45]  Amir Akhavan,et al.  A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps , 2006, ISCIS.

[46]  M. Jafarizadeh,et al.  Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps , 2009 .

[47]  Air Force Air Force Materiel Command Hq FIPS-PUB-180-1 , 1995 .

[48]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[49]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[50]  Tao Xiang,et al.  Collision analysis of one kind of chaos-based hash function , 2010 .

[51]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[52]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[53]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[54]  Yupu Hu,et al.  A knapsack-based probabilistic encryption scheme , 2007, Inf. Sci..

[55]  Yong Wang,et al.  Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.

[56]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[57]  Amir Akhavan,et al.  Cryptography based on chaotic random maps with position dependent weighting probabilities , 2009 .

[58]  Kwok-Wo Wong,et al.  True random number generator based on mouse movement and chaotic hash function , 2009, Inf. Sci..