Keyed Hash Function Using Hyper Chaotic System with Time-Varying Parameters Perturbation

45Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First, the input message is divided into four 1D arrays, to generate four perturbation sequences via parameter updating rule, the perturbed parameters are still within their significant intervals, to make the system remain a hyperchaotic state. Each iteration of the discrete hyperchaotic system uses updated parameters, and the last state variable values are extracted to generate a len-bit hash value by transformation algorithm. The algorithm is so flexible that it can generate 256, 512, 1024 or longer hash value through parameter switcher. The experimental evaluation and comparison demonstrated the hash function's resistance to differential attack and second pre-image attack. The proposed hash function can be applied in the identification, information integrity, and figure signature.

Cite

CITATION STYLE

APA

Liu, H., Kadir, A., & Liu, J. (2019). Keyed Hash Function Using Hyper Chaotic System with Time-Varying Parameters Perturbation. IEEE Access, 7, 37211–37219. https://doi.org/10.1109/ACCESS.2019.2896661

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free