Skip to main content

Designing Chaotic Chirikov Map-Based Secure Hash Function

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 413))

  • 888 Accesses

Abstract

In this paper, a new algorithm for designing one-way cryptographic hash function using chaotic Chirikov map is proposed. High sensitivity of Chirikov system makes it an ideal candidate for secure hash function design. In the proposed algorithm, the input message is split into a number of small blocks. The blocks are processed using chaotic map. The two intermediate hashes are generated using evolved control and input parameters. The two intermediate hash values are then employed to yield the final variable-length hash. The simulation and statistical analyses illustrate that the anticipated hash algorithm exhibits encouraging lineaments like high sensitivity to input messages and key, satisfactory confusion and diffusion attributes which verify the suitableness of proposed algorithm for the design of secure cryptographic variable-length hash functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing, 69(16), 2346–2350 (2006).

    Google Scholar 

  2. Wong, K. W.: A combined chaotic cryptographic and hashing scheme. Physics Letters A, 307(5–6), 292–298 (2003).

    Google Scholar 

  3. Menezes, A. J., Oorschot, P. C. V., Vanstone, S. A.: Handbook of applied cryptography, CRC Press (1997).

    Google Scholar 

  4. Secure Hash Standard. Federal Information Processing Standards Publications (FIPS PUBS), 180(2), (2002).

    Google Scholar 

  5. Singla, P., Sachdeva, P., Ahmad, M.: Exploring Chaotic Neural Network for Cryptographic Hash Function. Emerging Trends in Computing and Communication. Springer India, LNEE 143–148 (2014).

    Google Scholar 

  6. Wang, X., Yin, Y. L., Yu, H.: Finding collisions in the full SHA-1. Lecture Notes in Computer Science, 3621, 17–36 (2005).

    Google Scholar 

  7. Xiao, D., Liao, X., Wang, Y.: Parallel keyed hash function construction based on chaotic neural network. Neurocomputing, 72(10), 2288–2296 (2009).

    Google Scholar 

  8. Yang, H., Wong, K. W., Liao, X., Wang, Y., Yang, D.: One-way hash function construction based on chaotic map network. Chaos, Solitons & Fractals, 41, 2566–2574 (2009).

    Google Scholar 

  9. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151 (2005).

    Google Scholar 

  10. Chirikov, B.V.: Research concerning the theory of nonlinear resonance and stochasticity. Preprint N 267, Institute of Nuclear Physics, Novosibirsk (1969) (http://www.quantware.ups-tlse.fr/chirikov/refs/chi1969e.pdf).

  11. Akhshani, A., Behnia, S., Akhavan, A., Jafarizadeh, M.A., Hassan, H., Hassan, Z.: Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps. Chaos, Solitons & Fractals, 42(4), 2405–2412 (2009).

    Google Scholar 

  12. Akhavan, A., Samsudin, A., Akhshani, A.: A novel parallel hash function based on 3D chaotic map. EURASIP Journal on Advances in Signal Processing, 2013(126), (2013).

    Google Scholar 

  13. Shannon, C. E.: Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715 (1949).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Khurana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Khurana, S., Ahmad, M. (2016). Designing Chaotic Chirikov Map-Based Secure Hash Function. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0419-3_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0417-9

  • Online ISBN: 978-981-10-0419-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics