Skip to main content

2017 | OriginalPaper | Buchkapitel

Design and Evaluation of Chaotic Iterations Based Keyed Hash Function

verfasst von : Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang

Erschienen in: Information Science and Applications 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security. As an extension of our previous research works, a new chaotic iterations keyed hash function is proposed in this article. Chaotic iterations are used both to construct strategies with pseudorandom number generator and to calculate new hash values using classical hash functions. It is shown that, by doing so, it is possible to apply a kind of post-treatment on existing hash algorithms, which preserves their security properties while adding Devaney’s chaos. Security performance analysis of such a post-treatment are finally provided.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bahi, J.M., Guyeux, C.: Discrete Dynamical Systems and Chaotic Machines: Theory and Applications. CRC Press, Boca Raton (2013)MATH Bahi, J.M., Guyeux, C.: Discrete Dynamical Systems and Chaotic Machines: Theory and Applications. CRC Press, Boca Raton (2013)MATH
2.
Zurück zum Zitat US Department of Commerce/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995) US Department of Commerce/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995)
3.
Zurück zum Zitat Fang, X., Guyeux, C., Wang, Q., Bahi, J.: Randomness and disorder of chaotic iterations. Applications in information security field. In: NOLTA 2015, International Symposium on Nonlinear Theory and its Applications, Hong Kong, China, December 2015, pp. 1–4 (2015) Fang, X., Guyeux, C., Wang, Q., Bahi, J.: Randomness and disorder of chaotic iterations. Applications in information security field. In: NOLTA 2015, International Symposium on Nonlinear Theory and its Applications, Hong Kong, China, December 2015, pp. 1–4 (2015)
4.
Zurück zum Zitat Guyeux, C., Couturier, R., Héam, P.C., Bahi, J.M.: Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J. Supercomputing 71(10), 3877–3903 (2015)CrossRef Guyeux, C., Couturier, R., Héam, P.C., Bahi, J.M.: Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J. Supercomputing 71(10), 3877–3903 (2015)CrossRef
5.
Zurück zum Zitat Guyeux, C., Wang, Q., Fang, X., Bahi, J.M.: Introducing the truly chaotic finite state machines and theirs applications in security field. In: Nolta 2014, International Symposium on Nonlinear Theory and ITS Applications (2014) Guyeux, C., Wang, Q., Fang, X., Bahi, J.M.: Introducing the truly chaotic finite state machines and theirs applications in security field. In: Nolta 2014, International Symposium on Nonlinear Theory and ITS Applications (2014)
7.
Zurück zum Zitat Rivest, R.: The MD5 Message-Digest Algorithm. RFC Editor (1992) Rivest, R.: The MD5 Message-Digest Algorithm. RFC Editor (1992)
8.
Zurück zum Zitat Stevens, M., Lenstra, A., Weger, B.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1–22. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72540-4_1 CrossRef Stevens, M., Lenstra, A., Weger, B.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1–22. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-72540-4_​1 CrossRef
9.
Zurück zum Zitat Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., Weger, B.D.: Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Springer, Heidelberg (2009)CrossRefMATH Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., Weger, B.D.: Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Springer, Heidelberg (2009)CrossRefMATH
Metadaten
Titel
Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
verfasst von
Zhuosheng Lin
Christophe Guyeux
Simin Yu
Qianxue Wang
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_47

Neuer Inhalt