Skip to main content

Exploring Chaotic Neural Network for Cryptographic Hash Function

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 298))

Abstract

Due to the one way property of neural networks and high sensitivity of chaotic systems, chaotic neural networks make an ideal candidate for cryptographic hash function design. In this paper, a novel algorithm is proposed to construct an efficient cryptographic hash function using a four layer chaotic neural network. The proposed hash function satisfies the security requirements of confusion and diffusion, and the mechanism allows flexibility of the hash value length, which makes it resistant to birthday attack for hash lengths longer than 128 bits. Moreover, the running time of a neural network can be reduced with the help of parallel processing. The statistical analysis of the proposed algorithm proves it to be a promising choice for cryptographic hash function design.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Secure Hash Standard (2002) Federal information processing standards publications (FIPS PUBS) 180(2)

    Google Scholar 

  2. Vanstone SA, Menezes AJ, Oorschot PC (1996) Handbook of applied cryptography. CRC Press, Boca Raton, FL

    Google Scholar 

  3. Xiao D, Liao X, Wang Y (2009) Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72(10):2288–2296

    Article  Google Scholar 

  4. Lian S, Sun J, Wang Z (2006) Secure hash function based on neural network. Neurocomputing 69(16):2346–2350

    Article  Google Scholar 

  5. Wong KW (2003) A combined chaotic cryptographic and hashing scheme. Phys Lett A 307(5–6):292–298

    Article  MATH  MathSciNet  Google Scholar 

  6. Yang H, Wong KW, Liao X, Wang Y, Yang D (2009) One-way hash function construction based on chaotic map network. Chaos, Solitons Fractals 41:2566–2574

    Article  Google Scholar 

  7. Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHA-1. LNCS 3621:17–36

    MathSciNet  Google Scholar 

  8. Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcat Chaos 15(10):3119–3151

    Article  MATH  MathSciNet  Google Scholar 

  9. Akhshani A, Behnia S, Akhavan A, Jafarizadeh MA, Abu Hassan H, Hassan Z (2009) Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps. Chaos, Solitons Fractals 42(4):2405–2412

    Google Scholar 

  10. Shannon CE (1949) Communication theory of secrecy systems. Bell Sys Tech J 28:656–715

    Article  MATH  MathSciNet  Google Scholar 

  11. Akhavan A, Samsudin A, Akhshani A (2013) A novel parallel hash function based on 3D chaotic map. EURASIP J Adv Signal Process 2013(126)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prateek Singla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Singla, P., Sachdeva, P., Ahmad, M. (2014). Exploring Chaotic Neural Network for Cryptographic Hash Function. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1817-3_16

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1816-6

  • Online ISBN: 978-81-322-1817-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics