A secure hash function based on sponge construction and chaos-maps

被引:4
|
作者
Amine, Zellagui [1 ]
Naima, Hadj-Said [1 ]
Ali-Pacha, Adda [1 ]
机构
[1] USTO MB, Lab Coding & Secur Informat LACOSI, POB 1505, El Mnaouer Oran 31000, Algeria
关键词
PWLCM; hash function; chaotic maps; sponge construction; cloud computing; collision; password; BLOCKCHAIN TECHNOLOGY; AUTHENTICATION; SCHEME;
D O I
10.1504/IJCSE.2022.123116
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgard construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash function consists of three phases: message processing, absorbing and squeezing. In the message processing phase, the message is divided into n blocks, each block is processed by a standard chaotic map, then the absorbing phase takes the result of the message as input and generates a new output sequence using the PWLCM chaotic map, this process being repeated until all blocks of the message are processed. The final hash value is generated by the squeezing phase. The theoretical and experimental analysis shows that the proposed hash function has good statistical properties, high resistance to collision attacks, high sensitivity to any small change in the control parameter and message, and can be easily implemented and used for digital signatures, data management and password hashing in cloud computing.
引用
收藏
页码:285 / 297
页数:13
相关论文
共 50 条
  • [21] One-way hash function construction based on integer coupled tent maps
    Liu, Jiandong
    2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 126 - 129
  • [22] Hash function based on chaotic tent maps
    Yi, X
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2005, 52 (06) : 354 - 357
  • [23] Implementation of ECDSA Using Sponge Based Hash Function
    Lavanya, M.
    Natarajan, V.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 349 - 359
  • [24] A CRYPTOGRAPHIC HASH FUNCTION BASED ON A MODIFIED SPONGE SCHEME
    Ospanov, R. M.
    Seitkulov, Ye N.
    Yergaliyeva, B. B.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2022, 10 (02): : 55 - 70
  • [25] Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
    Liu, Jian-Dong
    Fu, Xiu-Li
    Tongxin Xuebao/Journal on Communications, 2007, 28 (06): : 30 - 38
  • [26] A secure hash function based on feedback iterative structure
    Yang, Yijun
    Chen, Fei
    Chen, Jianyong
    Zhang, Yong
    Yung, Kai Leung
    ENTERPRISE INFORMATION SYSTEMS, 2019, 13 (03) : 281 - 302
  • [27] A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
    Alawida, Moatsum
    Samsudin, Azman
    Alajarmeh, Nancy
    Sen Teh, Je
    Ahmad, Musheer
    Alshoura, Wafa' Hamdan
    IEEE ACCESS, 2021, 9 : 17882 - 17897
  • [28] Analysis and improvement of a chaos-based hash function construction (vol 15, pg 1338, 2010)
    Li, Yantao
    Deng, Shaojiang
    Xiao, Di
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (10) : 3233 - 3233
  • [29] Designing a Secure Round Function Based on Chaos
    Bin Lu
    Xin Ge
    Fenlin Liu
    中国通信, 2020, 17 (05) : 29 - 37
  • [30] Designing a Secure Round Function Based on Chaos
    Lu, Bin
    Ge, Xin
    Liu, Fenlin
    CHINA COMMUNICATIONS, 2020, 17 (05) : 29 - 37