A secure hash function based on sponge construction and chaos-maps

被引:4
|
作者
Amine, Zellagui [1 ]
Naima, Hadj-Said [1 ]
Ali-Pacha, Adda [1 ]
机构
[1] USTO MB, Lab Coding & Secur Informat LACOSI, POB 1505, El Mnaouer Oran 31000, Algeria
关键词
PWLCM; hash function; chaotic maps; sponge construction; cloud computing; collision; password; BLOCKCHAIN TECHNOLOGY; AUTHENTICATION; SCHEME;
D O I
10.1504/IJCSE.2022.123116
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgard construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash function consists of three phases: message processing, absorbing and squeezing. In the message processing phase, the message is divided into n blocks, each block is processed by a standard chaotic map, then the absorbing phase takes the result of the message as input and generates a new output sequence using the PWLCM chaotic map, this process being repeated until all blocks of the message are processed. The final hash value is generated by the squeezing phase. The theoretical and experimental analysis shows that the proposed hash function has good statistical properties, high resistance to collision attacks, high sensitivity to any small change in the control parameter and message, and can be easily implemented and used for digital signatures, data management and password hashing in cloud computing.
引用
收藏
页码:285 / 297
页数:13
相关论文
共 50 条
  • [41] Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
    Latif, M. Kamran
    Jacinto, H. S.
    Daoud, Luka
    Rafla, Nader
    2018 IEEE 61ST INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2018, : 984 - 987
  • [42] Construction of Strongly Secure Wiretap Channel Code Based on Hash Property
    Muramatsu, Jun
    Miyake, Shigeki
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 613 - 617
  • [43] A Hash Function based on Sponge Structure with Chaotic Map for Spinal Codes
    Huang, Wensha
    Wang, Lina
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 286 - 290
  • [44] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    ENTROPY, 2018, 20 (09)
  • [45] Hash function generation based on neural networks and chaotic maps
    Turcanik, Michal
    2017 COMMUNICATION AND INFORMATION TECHNOLOGIES (KIT), 2017, : 140 - 144
  • [46] Cryptanalysis on a parallel keyed hash function based on chaotic maps
    Guo, Wei
    Wang, Xiaoming
    He, Dake
    Cao, Yang
    PHYSICS LETTERS A, 2009, 373 (36) : 3201 - 3206
  • [47] Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction
    M. Mohammed Ibrahim
    R. Venkatesan
    Nasir Ali
    Muhammad Imran Qureshi
    Hafiz Muhammad Afzal Siddiqui
    Fikadu Tesgera Tolasa
    Suhad Ali Osman Abdallah
    Scientific Reports, 15 (1)
  • [48] Construction of hash function based on spatiotemporal chaotic systems
    Liu, Guang-Jie
    Shan, Liang
    Sun, Jin-Sheng
    Dai, Yue-Wei
    Wang, Zhi-Quan
    Kongzhi yu Juece/Control and Decision, 2006, 21 (11): : 1244 - 1248
  • [49] Hash function construction based on time average moire
    Ragulskis, Minvydas
    Navickas, Zenonas
    DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES B, 2007, 8 (04): : 1007 - 1020
  • [50] A chaos-based keyed hash function based on fixed point representation
    Je Sen Teh
    Kaijun Tan
    Moatsum Alawida
    Cluster Computing, 2019, 22 : 649 - 660