On the use of chaotic iterations to design keyed hash function

Affiliation auteurs!!!! Error affiliation !!!!
TitreOn the use of chaotic iterations to design keyed hash function
Type de publicationJournal Article
Year of Publication2019
AuteursLin Z, Guyeux C, Yu S, Wang Q, Cai S
JournalCLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
Volume22
Pagination905-919
Date PublishedJAN
Type of ArticleArticle
ISSN1386-7857
Mots-clésChaotic iterations, Keyed hash function, Post-processing, Security investigations
Résumé

Due to the complex dynamical properties of chaos, designing chaos-based hash functions emerged as a new research direction to reinforce information security of data sent through the Internet. This paper aims at developing a novel methodology to construct keyed hash functions based on chaotic iterations, which can avoid dynamic degradation caused by finite precision. The chaotic iterations are used first in the design of strategies thanks to particular pseudorandom number generators. They are also used in hash value computation, by iterating on state-of-the-art hash functions. Security investigations related to sensitiveness, diffusion and confusion, and collision analysis validate the proposed systematic methodology, showing that such post-processing on standard hash functions will preserve their security properties.

DOI10.1007/s10586-017-1062-6