Keyed- CAHASH: A new fast keyed hash function based on cellular automata for authentication

被引:0
|
作者
机构
[1] Echandouri, Bouchra
[2] Hanin, Charifa
[3] Omary, Fouzia
[4] Elbernoussi, Souad
关键词
Data integrity - Forgery attacks - HMAC - Key recovery attacks - Keyed hash functions - Message authentication codes;
D O I
暂无
中图分类号
学科分类号
摘要
Private data transmission over arbitrary canal is considered very risky. Hence, the need for designing robust cryptographic solutions ensuring both data integrity and authen- tication is very attempting. Therefore, Message Authentication Code (MAC) is one of the most provably secure algorithms that ensure integrity and authentication. Using a shared secret key, the receiver checks if an alteration has happened during transmission. This MAC may be derived from hash functions using a secret key. Since it is also easily implemented, this paper concerns the design of a new keyed hash function based on cellular automata. Our suggested MAC process provides a high effciency and robust- ness against MAC forgery and key recovery attacks comparing to well-known HMACs standards. Further, the obtained results show that it satisfies data integrity and authen- tication requirement. © Technomathematics Research Foundation.
引用
收藏
相关论文
共 50 条
  • [31] Collision analysis of a parallel keyed hash function based on chaotic neural network
    Zhou, Hu
    Wang, Shihong
    NEUROCOMPUTING, 2012, 97 : 108 - 114
  • [32] The keyed optical Hash function based on cascaded phase-truncated Fourier transforms
    He, Wenqi
    Peng, Xiang
    Qin, Wan
    Meng, Xiangfeng
    OPTICS COMMUNICATIONS, 2010, 283 (11) : 2328 - 2332
  • [33] A Topologically Simple Keyed Hash Function Based on Circular Chaotic Sinusoidal Map Network
    Jiteurtragool, N.
    Ketthong, P.
    Wannaboon, C.
    San-Um, W.
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1089 - 1094
  • [34] Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    Zhang, Jiashu
    Wang, Xiaomin
    Zhang, Wenfang
    PHYSICS LETTERS A, 2007, 362 (5-6) : 439 - 448
  • [35] Chaotic neural networks and farfalle construction based parallel keyed secure hash function
    Belal, Mohamad Mulham
    Maitra, Tanmoy
    Giri, Debasis
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2022, 5 (06)
  • [36] Lightweight Parabola Chaotic Keyed Hash Using SRAM-PUF for IoT Authentication
    Jiteurtragool, Nattagit
    Samkunta, Jirayu
    Ketthong, Patinya
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 724 - 730
  • [37] VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
    Selimis, G
    Sklavos, N
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 24 - 27
  • [38] An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code
    Juliato, Marcio
    Gebotys, Catherine
    2010 IEEE AEROSPACE CONFERENCE PROCEEDINGS, 2010,
  • [39] Efficient small-sized implementation of the keyed-hash message authentication code
    Yiakoumis, I
    Papadonikolakis, M
    Michail, H
    Kakarountas, AP
    Goutis, CE
    EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 1875 - 1878
  • [40] A keyed- hashing based self-synchronization mechanism for port address hopping communication
    Luo, Yue-bin
    Wang, Bao-sheng
    Wang, Xiao-feng
    Zhang, Bo-feng
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (05) : 719 - 728