Skip to main content

Chaos Based Hash Function

  • Chapter
Book cover Chaos-Based Cryptography

Part of the book series: Studies in Computational Intelligence ((SCI,volume 354))

Abstract

This chapter focuses on the construction of chaos-based hash function. Hash function is a special kind of one-way function which takes a variable-length input and returns a fixed-length value. As one of the cores of Cryptography, hashing is a basic technique widely used in information security. Utilizing chaos to construct hash function is a promising direction which attracts more and more attention. In this chapter, some preliminaries on hash function are firstly given in brief. Then, the systemic descriptions of different chaos-based construction approaches are presented in the order of the simple chaotic map-based hash function, the complex map-based hash function, the composite map-based hash function, the chaotic neural network-based hash function, the parallel hash function as well as the combined chaotic cryptographic and hashing scheme. Meanwhile, the detailed analyses of some typical chaos-based hash functions are described. Finally, by borrowing some principles from classical Cryptography, we summarize some instructions on chaos-based hash function secure construction which is beneficial to the hash function design based on chaos in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New Jersey (1999)

    Google Scholar 

  3. Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. Eurocrypt, pp. 1–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Chen, Z., Huang, Y.: Chaotic one way hash function. Communications Technology (7), 96–98 (2001) (in Chinese)

    Google Scholar 

  6. Liu, J., Xie, J., Wang, P.: One way hash function construction based on chaotic mappings. Journal of Tsinghua University (Sci. & Tech.) 40(7), 55–58 (2000) (in Chinese)

    Google Scholar 

  7. Wang, J., Wang, Y., Wang, M.: The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map. Acta Physica Sinica 55(10), 5048–5054 (2006) (in Chinese)

    MathSciNet  MATH  Google Scholar 

  8. Wang, X., Zhang, J., Zhang, W.: One way hash function construction based on the extended chaotic maps switch. Acta Physica Sinica 52(11), 2737–2742 (2003) (in Chinese)

    Google Scholar 

  9. Kwok, H., Tang, W.: A Chaos Based Cryptographic Hash function for Message Authentication. International Journal of Bifurcation and Chaos 15(12), 4043–4050 (2005)

    Article  MATH  Google Scholar 

  10. Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Communications in Nonlinear Science and Numerical Simulation 15(5), 1338–1347 (2010)

    Article  MathSciNet  Google Scholar 

  11. Yi, X.: Hash function based on the chaotic tent map. Transactions on Circuits and Systems 52(6), 354–357 (2005)

    Article  Google Scholar 

  12. Xiao, D., Liao, X., Deng, S.: One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons & Fractals 24(1), 65–71 (2005)

    MathSciNet  MATH  Google Scholar 

  13. Baranousky, A., Daems, D.: Design of one-dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation and Chaos 5(6), 1585–1598 (1995)

    Article  MathSciNet  Google Scholar 

  14. Wong, K.: A combined chaotic cryptographic and hashing scheme. Physics Letters A 307, 292–298 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  15. Peng, F., Qiu, S., Long, M.: One-way Hash function construction based on two-dimensional hyper-chaotic mappings. Acta Physica Sinica 54(10), 4562–4568 (2005) (in Chinese)

    Google Scholar 

  16. Wang, S., Hu, G.: Hash function based on chaotic map lattices. Chaos 17, 023119 (2007)

    Google Scholar 

  17. Wang, Y., Liao, X., Xiao, D.: One-way hash function construction based on 2D coupled map lattices. Information Sciences 178(5), 1391–1406 (2008)

    Article  MATH  Google Scholar 

  18. Wolf, A., Swift, J., Swinney, H., Vastano, J.: Determining Lyapunov exponents from a time series. Physica D 16, 285–317 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  19. Li, H., Feng, D.: Composite nonlinear discrete chaotic dynamical systems and keyed hash function. Chinese Journal of Computers 26(4), 460–464 (2003) (in Chinese)

    Google Scholar 

  20. Liu, G., Shan, L., Dai, Y., Sun, J., Wang, Z.: One-way Hash function based on based on chaotic neural network. Acta Physica Sinica 55(11), 5688–5693 (2006) (in Chinese)

    MathSciNet  MATH  Google Scholar 

  21. Wang, J., Wang, M., Wang, Y.: The collision of one keyed hash function based on chaotic map and analysis. Acta Physica Sinica 57(5), 2737–2742 (2008) (in Chinese)

    Google Scholar 

  22. Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing 69, 2346–2350 (2006)

    Article  Google Scholar 

  23. Xiao, D., Liao, X., Deang, S.: Parallel keyed hash function construction based on chaotic maps. Physics Letters A 372(26), 4682–4688 (2008)

    Article  MathSciNet  Google Scholar 

  24. Xiao, D., Liao, X., Wang, Y.: Improving the security of a parallel keyed hash function based on chaotic maps. Physics Letters A 373(47), 4346–4353 (2009)

    Article  MathSciNet  Google Scholar 

  25. Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter. Physics Letters A 362, 439–448 (2007)

    Article  MATH  Google Scholar 

  26. Xiao, D., Liao, X., Wong, K.: Improving the security of a dynamic look-up table based chaotic cryptosystem. IEEE Transactions on Circuits and Systems 53(6), 502–506 (2006)

    Article  Google Scholar 

  27. Baptista, M.: Cryptography with chaos. Physics Letters A 240, 50–54 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  28. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Physics Letters A 326, 211–218 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  29. Deng, S., Li, Y., Xiao, D.: A novel combined cryptographic and hash algorithm based on chaotic control character. Communications in Nonlinear Science and Numerical Simulation 14(11), 3889–3900 (2009)

    Article  MathSciNet  Google Scholar 

  30. Xiao, D., Liao, X., Wang, Y.: Collision analysis of one kind of chaos-based hash function. Physics Letters A 374(10), 1228–1231 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Xiao, D., Liao, X., Deng, S. (2011). Chaos Based Hash Function. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20542-2_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20541-5

  • Online ISBN: 978-3-642-20542-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics