메뉴 건너뛰기




Volumn 18, Issue 1, 2013, Pages 109-123

A fast and efficient chaos-based keyed hash function

Author keywords

4 Dimensional chaotic cat map; Chaos; Cryptography; Keyed hash function

Indexed keywords

HASH FUNCTIONS;

EID: 84865615382     PISSN: 10075704     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cnsns.2012.06.019     Document Type: Article
Times cited : (65)

References (42)
  • 2
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Springer-Verlag, dvances in Cryptology-Crypto 96 Proceedings
    • Bellare M., Canetti R., Krawczyk H. Keying hash functions for message authentication. Lecture Notes in Computer Science 1996, 1109:1-19. Springer-Verlag.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 1-19
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 85196163844 scopus 로고    scopus 로고
    • FIPS 180-1, Secure hash standard, federal information processing standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., 1995.
    • FIPS 180-1, Secure hash standard, federal information processing standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., 1995.
  • 5
    • 85196182374 scopus 로고    scopus 로고
    • Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, IACR Cryptology ePrint Archive
    • Wang X, Feng D, Lai X, Yu H. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, IACR Cryptology ePrint Archive, 2004, pp. 199.
    • (2004) , pp. 199
    • Wang, X.1    Feng, D.2    Lai, X.3    Yu, H.4
  • 6
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Springer-Verlag, Advances in cryptology-eurocrypt 05 proceedings
    • Wang X., Yu H. How to break MD5 and other hash functions. Lecture notes in computer science 2005, 3494:19-35. Springer-Verlag.
    • (2005) Lecture notes in computer science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 7
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Springer-Verlag, Advances in cryptology-crypto 05 proceedings
    • Wang X., Yin Y.L., Yu H. Finding collisions in the full SHA-1. Lecture notes in computer science 2005, 3494:17-36. Springer-Verlag.
    • (2005) Lecture notes in computer science , vol.3494 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 8
    • 0042786512 scopus 로고    scopus 로고
    • Cryptography with chaos
    • Baptista M.S. Cryptography with chaos. Phys Lett A 1998, 240:50-54.
    • (1998) Phys Lett A , vol.240 , pp. 50-54
    • Baptista, M.S.1
  • 10
    • 69249152191 scopus 로고    scopus 로고
    • Irregularly decimated chaotic map(s) for binary digits generations
    • Kanso A., Smaoui N. Irregularly decimated chaotic map(s) for binary digits generations. Int J Bifurcat Chaos 2009, 19(4):1169-1183.
    • (2009) Int J Bifurcat Chaos , vol.19 , Issue.4 , pp. 1169-1183
    • Kanso, A.1    Smaoui, N.2
  • 11
    • 67349197413 scopus 로고    scopus 로고
    • Logistic chaotic maps for binary numbers generations
    • Kanso A., Smaoui N. Logistic chaotic maps for binary numbers generations. Chaos Solitons Fract 2009, 40(5):2557-2568.
    • (2009) Chaos Solitons Fract , vol.40 , Issue.5 , pp. 2557-2568
    • Kanso, A.1    Smaoui, N.2
  • 12
    • 2442684584 scopus 로고    scopus 로고
    • A combined chaotic cryptographic and hashing scheme
    • Wong K.W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 2003, 307:292-298.
    • (2003) Phys Lett A , vol.307 , pp. 292-298
    • Wong, K.W.1
  • 13
    • 33644670737 scopus 로고    scopus 로고
    • A chaos-based cryptographic hash function for message authentication
    • Kwok H., Tang W. A chaos-based cryptographic hash function for message authentication. Int J Bifurcat Chaos 2005, 15:4043-4050.
    • (2005) Int J Bifurcat Chaos , vol.15 , pp. 4043-4050
    • Kwok, H.1    Tang, W.2
  • 14
    • 22244444503 scopus 로고    scopus 로고
    • Hash function based on chaotic tent maps
    • Yi X. Hash function based on chaotic tent maps. IEEE Trans Circuits Syst - II 2005, 52(6):354-357.
    • (2005) IEEE Trans Circuits Syst - II , vol.52 , Issue.6 , pp. 354-357
    • Yi, X.1
  • 15
    • 9644303109 scopus 로고    scopus 로고
    • One-way hash function construction based on the chaotic map with changeable-parameter
    • Xiao D., Liao X., Deng S. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract 2005, 24(386):65-71.
    • (2005) Chaos Solitons Fract , vol.24 , Issue.386 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 16
    • 24744456105 scopus 로고    scopus 로고
    • One way hash function construction based on spatiotemporal chaos
    • Zhang H., Wang X., Li Z., Liu D. One way hash function construction based on spatiotemporal chaos. Acta Phys Sinica 2005, 54(9):4006-4011.
    • (2005) Acta Phys Sinica , vol.54 , Issue.9 , pp. 4006-4011
    • Zhang, H.1    Wang, X.2    Li, Z.3    Liu, D.4
  • 18
    • 33846348219 scopus 로고    scopus 로고
    • Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    • Zhang J., Wang X., Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 2007, 362:439-448.
    • (2007) Phys Lett A , vol.362 , pp. 439-448
    • Zhang, J.1    Wang, X.2    Zhang, W.3
  • 19
    • 37249092682 scopus 로고    scopus 로고
    • One-way hash function construction based on 2D coupled map lattices
    • Wang Y., Liao X., Xiao D., Wong K. One-way hash function construction based on 2D coupled map lattices. Inform Sci 2008, 178:1391-1406.
    • (2008) Inform Sci , vol.178 , pp. 1391-1406
    • Wang, Y.1    Liao, X.2    Xiao, D.3    Wong, K.4
  • 20
    • 44449128947 scopus 로고    scopus 로고
    • Parallel keyed hash function construction based on chaotic maps
    • Xiao D., Liao X., Deng S. Parallel keyed hash function construction based on chaotic maps. Phys Lett A 2008, 372:4682-4688.
    • (2008) Phys Lett A , vol.372 , pp. 4682-4688
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 21
    • 67349180690 scopus 로고    scopus 로고
    • Parallel keyed hash function construction based on chaotic neural network
    • Xiao D., Liao X., Wang Y. Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 2009, 72:2288-2296.
    • (2009) Neurocomputing , vol.72 , pp. 2288-2296
    • Xiao, D.1    Liao, X.2    Wang, Y.3
  • 22
    • 67650995788 scopus 로고    scopus 로고
    • A novel method for one-way hash function construction based on spatiotemporal chaos
    • Ren H., Wang Y., Xie Q., Yang H. A novel method for one-way hash function construction based on spatiotemporal chaos. Chaos Solitons Fract 2009, 42(4):2014-2022.
    • (2009) Chaos Solitons Fract , vol.42 , Issue.4 , pp. 2014-2022
    • Ren, H.1    Wang, Y.2    Xie, Q.3    Yang, H.4
  • 23
    • 67650071037 scopus 로고    scopus 로고
    • Hash function based on piecewise nonlinear chaotic map
    • Akhavan A., Samsudin A., Akhshani A. Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fract 2009, 42(2):1046-1053.
    • (2009) Chaos Solitons Fract , vol.42 , Issue.2 , pp. 1046-1053
    • Akhavan, A.1    Samsudin, A.2    Akhshani, A.3
  • 24
    • 67349196408 scopus 로고    scopus 로고
    • A novel combined cryptographic and hash algorithm based on chaotic control character
    • Deng S., Xiao D., Li Y., Peng W. A novel combined cryptographic and hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simul 2009, 14:3889-3900.
    • (2009) Commun Nonlinear Sci Numer Simul , vol.14 , pp. 3889-3900
    • Deng, S.1    Xiao, D.2    Li, Y.3    Peng, W.4
  • 25
    • 71249163712 scopus 로고    scopus 로고
    • Improving the security of a parallel keyed hash function based on chaotic maps
    • Xiao D., Liao X., Wang Y. Improving the security of a parallel keyed hash function based on chaotic maps. Phys Lett A 2009, 373:4346-4353.
    • (2009) Phys Lett A , vol.373 , pp. 4346-4353
    • Xiao, D.1    Liao, X.2    Wang, Y.3
  • 27
    • 67649867159 scopus 로고    scopus 로고
    • Chaos-based hash function (CBHF) for cryptographic applications
    • Amin M., Faragallah O., El-Latif A. Chaos-based hash function (CBHF) for cryptographic applications. Chaos Soliton Fract 2009, 42:767-772.
    • (2009) Chaos Soliton Fract , vol.42 , pp. 767-772
    • Amin, M.1    Faragallah, O.2    El-Latif, A.3
  • 28
    • 70449124689 scopus 로고    scopus 로고
    • Analysis and improvement of a chaos-based hash function construction
    • Deng S., Li Y., Xiao D. Analysis and improvement of a chaos-based hash function construction. Commun Nonlinear Sci Numer Simul 2010, 15(5):1338-1347.
    • (2010) Commun Nonlinear Sci Numer Simul , vol.15 , Issue.5 , pp. 1338-1347
    • Deng, S.1    Li, Y.2    Xiao, D.3
  • 29
    • 77949485060 scopus 로고    scopus 로고
    • A chaos-based hash function with both modification detection and localization capabilities
    • Xiao D., Shih F., Liao X. A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 2010, 15(9):2254-2261.
    • (2010) Commun Nonlinear Sci Numer Simul , vol.15 , Issue.9 , pp. 2254-2261
    • Xiao, D.1    Shih, F.2    Liao, X.3
  • 30
    • 79951576549 scopus 로고    scopus 로고
    • Parallel hash function construction based on coupled map lattices
    • Wang Y., Wong K., Xiao D. Parallel hash function construction based on coupled map lattices. Commun Nonlinear Sci Numer Simul 2011, 16(7):2810-2821.
    • (2011) Commun Nonlinear Sci Numer Simul , vol.16 , Issue.7 , pp. 2810-2821
    • Wang, Y.1    Wong, K.2    Xiao, D.3
  • 31
    • 79952538941 scopus 로고    scopus 로고
    • A more secure parallel keyed hash function based on chaotic neural network
    • Huang Z. A more secure parallel keyed hash function based on chaotic neural network. Commun Nonlinear Sci Numer Simul 2011, 16:3245-3256.
    • (2011) Commun Nonlinear Sci Numer Simul , vol.16 , pp. 3245-3256
    • Huang, Z.1
  • 32
    • 2442662577 scopus 로고    scopus 로고
    • Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    • Alvarez G., Montoya F., Romera M., Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 2004, 326:211-218.
    • (2004) Phys Lett A , vol.326 , pp. 211-218
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 33
    • 34047273584 scopus 로고    scopus 로고
    • Study of chaos functions for their suitability in generating message authentication codes
    • Arumugam G., Lakshmi Praba V., Radhakrishana S. Study of chaos functions for their suitability in generating message authentication codes. Appl Soft Comput 2007, 7(3):1064-1071.
    • (2007) Appl Soft Comput , vol.7 , Issue.3 , pp. 1064-1071
    • Arumugam, G.1    Lakshmi Praba, V.2    Radhakrishana, S.3
  • 34
    • 68349095081 scopus 로고    scopus 로고
    • Cryptanalysis on a parallel keyed hash function based on chaotic maps
    • Guo W., Wang X., He D., Cao Y. Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys Lett A 2009, 373:2306-3201.
    • (2009) Phys Lett A , vol.373 , pp. 2306-3201
    • Guo, W.1    Wang, X.2    He, D.3    Cao, Y.4
  • 35
    • 74449091174 scopus 로고    scopus 로고
    • Collision analysis of one kind of chaos-based hash function
    • Xiao D., Peng W., Liao X., Xiang T. Collision analysis of one kind of chaos-based hash function. Phys Lett A 2010, 374:1228-1231.
    • (2010) Phys Lett A , vol.374 , pp. 1228-1231
    • Xiao, D.1    Peng, W.2    Liao, X.3    Xiang, T.4
  • 36
    • 80053127262 scopus 로고    scopus 로고
    • Security analysis of a one-way hash function based on spatiotemporal chaos
    • Wang S., Shan P. Security analysis of a one-way hash function based on spatiotemporal chaos. Chin Phys B 2011, 20:90504-90507.
    • (2011) Chin Phys B , vol.20 , pp. 90504-90507
    • Wang, S.1    Shan, P.2
  • 37
    • 80052361673 scopus 로고    scopus 로고
    • Collision analysis of a chaos-based hash function with both modification detection and localization capability
    • Wang S., Li D., Zhou H. Collision analysis of a chaos-based hash function with both modification detection and localization capability. Commun Nonlinear Sci Numer Simul 2012, 17(2):780-7844.
    • (2012) Commun Nonlinear Sci Numer Simul , vol.17 , Issue.2 , pp. 780-7844
    • Wang, S.1    Li, D.2    Zhou, H.3
  • 38
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic cat maps
    • Chen G., Mao Y., Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 2004, 21:749-761.
    • (2004) Chaos Solitons Fract , vol.21 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.3
  • 40
    • 85196211273 scopus 로고    scopus 로고
    • NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, 2008, online document.
    • NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, 2008, online document. http://csrc.nist.gov/groups/ST/toolkit/rng/documentationsoftware.html.
  • 41
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Springer-Verlag, Advances in cryptology-crypto proceedings 89
    • Merkle R. One way hash functions and DES. Lecture notes in computer science 1989, 435:428-446. Springer-Verlag.
    • (1989) Lecture notes in computer science , vol.435 , pp. 428-446
    • Merkle, R.1
  • 42
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Springer-Verlag, Advances in cryptology-crypto 89 proceedings
    • Damgard I. A design principle for hash functions. Lecture notes in computer science 1989, 435:416-427. Springer-Verlag.
    • (1989) Lecture notes in computer science , vol.435 , pp. 416-427
    • Damgard, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.