Keyed- CAHASH: A new fast keyed hash function based on cellular automata for authentication

被引:0
|
作者
机构
[1] Echandouri, Bouchra
[2] Hanin, Charifa
[3] Omary, Fouzia
[4] Elbernoussi, Souad
关键词
Data integrity - Forgery attacks - HMAC - Key recovery attacks - Keyed hash functions - Message authentication codes;
D O I
暂无
中图分类号
学科分类号
摘要
Private data transmission over arbitrary canal is considered very risky. Hence, the need for designing robust cryptographic solutions ensuring both data integrity and authen- tication is very attempting. Therefore, Message Authentication Code (MAC) is one of the most provably secure algorithms that ensure integrity and authentication. Using a shared secret key, the receiver checks if an alteration has happened during transmission. This MAC may be derived from hash functions using a secret key. Since it is also easily implemented, this paper concerns the design of a new keyed hash function based on cellular automata. Our suggested MAC process provides a high effciency and robust- ness against MAC forgery and key recovery attacks comparing to well-known HMACs standards. Further, the obtained results show that it satisfies data integrity and authen- tication requirement. © Technomathematics Research Foundation.
引用
收藏
相关论文
共 50 条
  • [21] A chaos-based keyed hash function based on fixed point representation
    Je Sen Teh
    Kaijun Tan
    Moatsum Alawida
    Cluster Computing, 2019, 22 : 649 - 660
  • [22] Improving the security of a parallel keyed hash function based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Wang, Yong
    PHYSICS LETTERS A, 2009, 373 (47) : 4346 - 4353
  • [23] The design of keyed hash function based on CNN-MD structure
    Wang, Yu
    Chen, Liquan
    Wang, Xingyuan
    Wu, Ge
    Yu, Kunliang
    Lu, Tianyu
    CHAOS SOLITONS & FRACTALS, 2021, 152
  • [24] A chaos-based keyed hash function based on fixed point representation
    Teh, Je Sen
    Tan, Kaijun
    Alawida, Moatsum
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 649 - 660
  • [25] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function
    Michail, HE
    Kakarountas, AP
    Milidonis, A
    Goutis, CE
    ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
  • [26] A more secure parallel keyed hash function based on chaotic neural network
    Huang, Zhongquan
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) : 3245 - 3256
  • [27] Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
    Xiaomin Wang
    Wei Guo
    Wenfang Zhang
    Muhammad Khurram Khan
    Khaled Alghathbar
    Telecommunication Systems, 2013, 52 : 515 - 524
  • [28] BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor
    Todorova, M.
    Stoyanov, B.
    Szczypiorski, K.
    Graniszewski, W.
    Kordov, K.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2019, 67 (03) : 557 - 569
  • [29] Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
    Wang, Xiaomin
    Guo, Wei
    Zhang, Wenfang
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 515 - 524
  • [30] A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks
    Chankasame, Winai
    San-Um, Wimol
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1357 - 1364