Construct and Analyze K-Hash Function Based on Chaotic Dynamic S-Boxes

Article Preview

Abstract:

By combining the traditional iteration structure of Hash function with the dynamic S-boxes, a novel keyed Hash function is presented. The proposed approach can give a chaotic Hash value by means of the lookup table of functions and chaotic dynamic S-box. Compared with the existing chaotic Hash functions, this method improves computational performance of Hash system by using the chaotic S-box substitution. Theoretical and experimental results show that the proposed method has not only strong one way property, sensitivity to initial conditions and chaotic system’s parameters, but also high speed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

891-898

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] X.C. Ding,H. Wang etc. The theory of information security and legal protection in the e-government [J]. The Administration of China, 2002(10); 55-58<In Chinese>.

Google Scholar

[2] A. Menezes, P. Van Ooschot, and S. vanstone. Handbook of Applied Cryptography, CRC, Boca Raton, FL, (1997).

Google Scholar

[3] Kwok-Wo Wong. A combined chaotic cryptographic and hashing scheme[J]. Physics Letters A, 2003, 307: 292–298.

DOI: 10.1016/s0375-9601(02)01770-x

Google Scholar

[4] LI SH.J. MOU X.Q., CAI Y.L. Improving security of a chaotic encryption approach. Physics Letters A[J], 2001, 290(4): 127–133.

DOI: 10.1016/s0375-9601(01)00612-0

Google Scholar

[5] S.J. Li. The Analysis and Design of The Digital Chaotic Cipher [D]. PHD Thesis, XI'AN JIAOTONG UNIVERSITY,2003<In Chinese>.

Google Scholar

[6] P.C. Wei. Chaotic Pseudo-Random Sequence and its Application Research [D]. PHD Thesis, Chongqing University, 2008<In Chinese>.

Google Scholar

[7] J. Seberry, X. M. Zhang, Y. Zheng. Systematic generation of cryptographically robust S-boxes[C]. Proceeding of the First ACM Conference on Computer and Communications Security, The Association for Computing Machinery, New York, November (1993).

DOI: 10.1145/168588.168610

Google Scholar

[8] X.F. Guo J.S. Zhang. Construct the Hash Function Based on Chaotic Dynamic S-box [J].Journal of Physics , 2006, 55(9): 4442-08. <In Chinese>.

Google Scholar

[9] P.C. Wei,W. Zhang X.F. Liao H.Q. Yang. Construct Secret Key Hash Function Based on Dual Chaotic System[J]. Journal on Communications, 2006, 27(9), 27-33<In Chinese>.

Google Scholar