A chaos-based hash function with both modification detection and localization capabilities

被引:54
|
作者
Xiao, Di [1 ,2 ]
Shih, Frank Y. [2 ]
Liao, Xiaofeng [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci & Engn, Chongqing 400044, Peoples R China
[2] New Jersey Inst Technol, Coll Comp Sci, Comp Vis Lab, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Hash function; Chaos; Modification detection and localization; Parallel; MAPS;
D O I
10.1016/j.cnsns.2009.10.012
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, a variety of chaos-based hash functions have been proposed. Nevertheless, none of them can realize modification localization. In this paper, a hash function with both modification detection and localization capabilities is proposed, which can also support the parallel processing mode. By using the mechanism of changeable-parameter and self-synchronization, the keystream can establish a close relation with the algorithm key, the content, and the order of each message unit. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash functions. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2254 / 2261
页数:8
相关论文
共 50 条
  • [21] New Enrollment Scheme for Biometric Template using Hash Chaos-Based Cryptography
    Mihailescu, Marius Iulian
    24TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2013, 2014, 69 : 1459 - 1468
  • [22] Cycle detection for secure chaos-based encryption
    Hasimoto-Beltran, Rogelio
    Ramirez-Ramirez, Roxana
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) : 3203 - 3211
  • [23] Noisy optical detection of chaos-based watermarks
    Mooney, A
    Keating, JG
    PHOTONICS NORTH: APPLICATIONS OF PHOTONIC TECHNOLOGY, PTS 1 AND 2: CLOSING THE GAP BETWEEN THEORY, DEVELOPMENT, AND APPLICATION, 2004, 5579 : 341 - 350
  • [24] A CHAOS-BASED AND ENSEMBLED METHOD FOR OUTLIER DETECTION
    Wei, Li
    2022 19TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2022,
  • [25] An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack
    W. Ghonaim
    Neveen I. Ghali
    Aboul Ella Hassanien
    Soumya Banerjee
    Memetic Computing, 2013, 5 : 179 - 185
  • [26] An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack
    Ghonaim, W.
    Ghali, Neveen I.
    Hassanien, Aboul Ella
    Banerjee, Soumya
    MEMETIC COMPUTING, 2013, 5 (03) : 179 - 185
  • [27] Composite chaos-based lossless image authentication and tamper localization
    Gao, Guangyong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 63 (03) : 947 - 964
  • [28] Composite chaos-based lossless image authentication and tamper localization
    Guangyong Gao
    Multimedia Tools and Applications, 2013, 63 : 947 - 964
  • [29] Chaos-based image hybrid encryption algorithm using key stretching and hash feedback
    Liu, Hongjun
    Xu, Yanqiu
    Ma, Chao
    OPTIK, 2020, 216
  • [30] Study on target detection technique of chaos-based modulation
    Sun, DN
    Deng, JH
    Huang, ZH
    Wei, SJ
    Pan, SG
    2004 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL ELECTROMAGNETICS AND ITS APPLICATIONS, PROCEEDINGS, 2004, : 364 - 367