Abstract
In this paper, a new algorithm for designing one-way cryptographic hash function using chaotic Chirikov map is proposed. High sensitivity of Chirikov system makes it an ideal candidate for secure hash function design. In the proposed algorithm, the input message is split into a number of small blocks. The blocks are processed using chaotic map. The two intermediate hashes are generated using evolved control and input parameters. The two intermediate hash values are then employed to yield the final variable-length hash. The simulation and statistical analyses illustrate that the anticipated hash algorithm exhibits encouraging lineaments like high sensitivity to input messages and key, satisfactory confusion and diffusion attributes which verify the suitableness of proposed algorithm for the design of secure cryptographic variable-length hash functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing, 69(16), 2346–2350 (2006).
Wong, K. W.: A combined chaotic cryptographic and hashing scheme. Physics Letters A, 307(5–6), 292–298 (2003).
Menezes, A. J., Oorschot, P. C. V., Vanstone, S. A.: Handbook of applied cryptography, CRC Press (1997).
Secure Hash Standard. Federal Information Processing Standards Publications (FIPS PUBS), 180(2), (2002).
Singla, P., Sachdeva, P., Ahmad, M.: Exploring Chaotic Neural Network for Cryptographic Hash Function. Emerging Trends in Computing and Communication. Springer India, LNEE 143–148 (2014).
Wang, X., Yin, Y. L., Yu, H.: Finding collisions in the full SHA-1. Lecture Notes in Computer Science, 3621, 17–36 (2005).
Xiao, D., Liao, X., Wang, Y.: Parallel keyed hash function construction based on chaotic neural network. Neurocomputing, 72(10), 2288–2296 (2009).
Yang, H., Wong, K. W., Liao, X., Wang, Y., Yang, D.: One-way hash function construction based on chaotic map network. Chaos, Solitons & Fractals, 41, 2566–2574 (2009).
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151 (2005).
Chirikov, B.V.: Research concerning the theory of nonlinear resonance and stochasticity. Preprint N 267, Institute of Nuclear Physics, Novosibirsk (1969) (http://www.quantware.ups-tlse.fr/chirikov/refs/chi1969e.pdf).
Akhshani, A., Behnia, S., Akhavan, A., Jafarizadeh, M.A., Hassan, H., Hassan, Z.: Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps. Chaos, Solitons & Fractals, 42(4), 2405–2412 (2009).
Akhavan, A., Samsudin, A., Akhshani, A.: A novel parallel hash function based on 3D chaotic map. EURASIP Journal on Advances in Signal Processing, 2013(126), (2013).
Shannon, C. E.: Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715 (1949).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Khurana, S., Ahmad, M. (2016). Designing Chaotic Chirikov Map-Based Secure Hash Function. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_32
Download citation
DOI: https://doi.org/10.1007/978-981-10-0419-3_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0417-9
Online ISBN: 978-981-10-0419-3
eBook Packages: EngineeringEngineering (R0)