Keyed- CAHASH: A new fast keyed hash function based on cellular automata for authentication

被引:0
|
作者
机构
[1] Echandouri, Bouchra
[2] Hanin, Charifa
[3] Omary, Fouzia
[4] Elbernoussi, Souad
关键词
Data integrity - Forgery attacks - HMAC - Key recovery attacks - Keyed hash functions - Message authentication codes;
D O I
暂无
中图分类号
学科分类号
摘要
Private data transmission over arbitrary canal is considered very risky. Hence, the need for designing robust cryptographic solutions ensuring both data integrity and authen- tication is very attempting. Therefore, Message Authentication Code (MAC) is one of the most provably secure algorithms that ensure integrity and authentication. Using a shared secret key, the receiver checks if an alteration has happened during transmission. This MAC may be derived from hash functions using a secret key. Since it is also easily implemented, this paper concerns the design of a new keyed hash function based on cellular automata. Our suggested MAC process provides a high effciency and robust- ness against MAC forgery and key recovery attacks comparing to well-known HMACs standards. Further, the obtained results show that it satisfies data integrity and authen- tication requirement. © Technomathematics Research Foundation.
引用
收藏
相关论文
共 50 条
  • [1] A fast and efficient chaos-based keyed hash function
    Kanso, A.
    Ghebleh, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (01) : 109 - 123
  • [2] Keyed hash function based on a chaotic map
    Kanso, A.
    Yahyaoui, H.
    Almulla, M.
    INFORMATION SCIENCES, 2012, 186 (01) : 249 - 264
  • [3] L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID
    Hanin, Charifa
    Echandouri, Bouchra
    Omary, Fouzia
    El Bernoussi, Souad
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 287 - 298
  • [4] New Keyed Chaotic Neural Network Hash Function Based on Sponge Construction
    Abdoun, Nabil
    El Assad, Safwan
    Hammoud, Khodor
    Assaf, Rima
    Khalil, Mohamad
    Deforges, Olivier
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 35 - 38
  • [5] Keyed hash function based on a dynamic lookup table of functions
    Li, Yantao
    Xiao, Di
    Deng, Shaojiang
    INFORMATION SCIENCES, 2012, 214 : 56 - 75
  • [6] "SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION
    Kiryukhin, V. A.
    Sergeev, A. M.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2024, (63): : 24 - 48
  • [7] Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
    Lin, Zhuosheng
    Guyeux, Christophe
    Yu, Simin
    Wang, Qianxue
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 404 - 414
  • [8] Parallel keyed hash function construction based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Deng, Shaojiang
    PHYSICS LETTERS A, 2008, 372 (26) : 4682 - 4688
  • [9] Keyed Hash function based on composite nonlinear autoregressive filter
    Wang, XM
    Zhang, JS
    Zhang, WF
    ACTA PHYSICA SINICA, 2005, 54 (12) : 5566 - 5573
  • [10] Cryptanalysis on a parallel keyed hash function based on chaotic maps
    Guo, Wei
    Wang, Xiaoming
    He, Dake
    Cao, Yang
    PHYSICS LETTERS A, 2009, 373 (36) : 3201 - 3206