One-Way Hash Function Based on Delay-Induced Hyperchaos

被引:7
|
作者
Ren, Hai-Peng [1 ]
Zhao, Chao-Feng [1 ]
Grebogi, Celso [2 ]
机构
[1] Xian Univ Technol, Shaanxi Key Lab Complex Syst Control & Intelligen, Xian 710048, Peoples R China
[2] Univ Aberdeen, Inst Complex Syst & Math Biol, Aberdeen AB24 3UE, Scotland
来源
关键词
One-way Hash function; hyperchaos induced by time delay; key-stream function; cipher block chaining; IMAGE ENCRYPTION SCHEME; CHAOS; CRYPTANALYSIS; CONSTRUCTION;
D O I
10.1142/S0218127420500200
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A scheme for constructing one-way Hash function based on hyperchaos induced by time delay and key-stream function iteration is proposed in this paper. In this scheme, the plaintext and secret key are used as the initial value in two hyperchaotic Chen systems; these values are evolved in a hyperchaotic way during a predefined period. The results of the evolution are quantified and iterated using key-stream function iteration to confuse and diffuse the plaintext and secret key. The cipher block chaining mode is used to generate a 128 bits Hash value for a plaintext of arbitrary length. Theoretical analysis and simulation results indicate that the proposed algorithm has satisfactory performance, such as value compression function, irreversibility, initial value sensitivity, forgery resistance and collision resistance.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen Tzer-Shyong
    Chung Yu-Fang
    Journal of Computer Science and Technology, 2003, 18 : 210 - 213
  • [32] Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network
    Yang, Qun-ting
    Gao, Tie-gang
    Fan, Li
    Gu, Qiao-lun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 391 - +
  • [33] One-way hash function based on hyper-chaotic cellular neural network
    Yang Qun-Ting
    Gao Tie-Gang
    CHINESE PHYSICS B, 2008, 17 (07) : 2388 - 2393
  • [34] AN optimized LKH scheme based on one-way hash function for secure group communications
    Kang Qiao-Yan
    Meng Xiang-Ru
    Wang Jian-Feng
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1107 - +
  • [35] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen, TS
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (02) : 210 - 213
  • [36] Signature scheme based on discrete logarithm without using one-way hash function
    Shao, ZH
    ELECTRONICS LETTERS, 1998, 34 (11) : 1079 - 1080
  • [37] Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
    Liu, Jian-Dong
    Fu, Xiu-Li
    Tongxin Xuebao/Journal on Communications, 2007, 28 (06): : 30 - 38
  • [38] The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map
    Wang Ji-Zhi
    Wang Ying-Long
    Wang Mei-Qin
    ACTA PHYSICA SINICA, 2006, 55 (10) : 5048 - 5054
  • [39] Secure One-Way Hash Function Using Cellular Automata for IoT
    Wu, Shyi-Tsong
    Chang, Jieh-Ren
    SUSTAINABILITY, 2023, 15 (04)
  • [40] One-way hash functions based on iterated chaotic systems
    Peng, Fei
    Qiu, Shui-Sheng
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 1070 - +