Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

被引:15
|
作者
Ayubi, Peyman [1 ]
Setayeshi, Saeed [2 ]
Rahmani, Amir Masoud [1 ,3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Amirkabir Univ Technol, Dept Med Radiat Engn, Tehran, Iran
[3] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, 123 Univ Rd,Sect 3, Touliu 64002, Yunlin, Taiwan
关键词
Chaotic hash function; Chaotic map; Complex quadratic map; Security; SCHEME;
D O I
10.1016/j.chaos.2023.113647
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the last two decades, the use of chaotic iterative maps in cryptographic systems, especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial conditions and control parameters in chaotic systems is the best feature for designing a chaotic hash function. This paper introduces a new generalized chaotic map based on a complex quadratic map, which in addition to the chaotic behavior in the real and imaginary parts, also has a high key length, which can guarantee the security of a cryptographic system. Various analyses of dynamical systems, such as the bifurcation diagram and the Lyapunov exponent, show that the proposed chaotic map has the characteristics of a chaotic dynamical system. The foundation of a secure and efficient algorithm for designing and developing a new hash function lies in how to use this new chaotic map. Also, statistical analysis, collision analysis, key space analysis, and speed analysis use to prove the security and efficiency of the proposed method. The results of these analyses and their comparison with similar methods show that the proposed method can be a reliable and efficient method for practical applications in information technology.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Collision analysis of a parallel keyed hash function based on chaotic neural network
    Zhou, Hu
    Wang, Shihong
    NEUROCOMPUTING, 2012, 97 : 108 - 114
  • [22] New Keyed Chaotic Neural Network Hash Function Based on Sponge Construction
    Abdoun, Nabil
    El Assad, Safwan
    Hammoud, Khodor
    Assaf, Rima
    Khalil, Mohamad
    Deforges, Olivier
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 35 - 38
  • [23] SHAH: Hash Function Based on Irregularly Decimated Chaotic Map
    Todorova, Mihaela
    Stoyanov, Borislav
    Szczypiorski, Krzysztof
    Kordov, Krasimir
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (04) : 457 - 465
  • [24] Novel Hash Function Based on Coupled Chaotic Map Lattices
    Zhen Ping
    Zhao Geng
    Min Lequan
    Li Xiaodong
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 836 - 841
  • [25] Hash Function Construction Based on Chaotic Coupled Map Network
    Song, Yurong
    Jiang, Guoping
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2753 - 2758
  • [26] Novel Hash Function Based on Coupled Chaotic Map Lattices
    ZHEN Ping
    ZHAO Geng
    MIN Lequan
    LI Xiaodong
    ChineseJournalofElectronics, 2014, 23 (04) : 836 - 841
  • [27] Constructing Keyed Hash Algorithm Using Enhanced Chaotic Map with Varying Parameter
    Liu, Hongjun
    Kadir, Abdurahman
    Ma, Chao
    Xu, Chengbo
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [28] Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    Zhang, Jiashu
    Wang, Xiaomin
    Zhang, Wenfang
    PHYSICS LETTERS A, 2007, 362 (5-6) : 439 - 448
  • [29] Chaotic neural networks and farfalle construction based parallel keyed secure hash function
    Belal, Mohamad Mulham
    Maitra, Tanmoy
    Giri, Debasis
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2022, 5 (06)
  • [30] Hash function construction based on chaotic system of coupled map lattice
    Cheng, Yan-Yun
    Song, Yu-Rong
    Yingyong Kexue Xuebao/Journal of Applied Sciences, 2010, 28 (01): : 44 - 48