Abstract
This chapter focuses on the construction of chaos-based hash function. Hash function is a special kind of one-way function which takes a variable-length input and returns a fixed-length value. As one of the cores of Cryptography, hashing is a basic technique widely used in information security. Utilizing chaos to construct hash function is a promising direction which attracts more and more attention. In this chapter, some preliminaries on hash function are firstly given in brief. Then, the systemic descriptions of different chaos-based construction approaches are presented in the order of the simple chaotic map-based hash function, the complex map-based hash function, the composite map-based hash function, the chaotic neural network-based hash function, the parallel hash function as well as the combined chaotic cryptographic and hashing scheme. Meanwhile, the detailed analyses of some typical chaos-based hash functions are described. Finally, by borrowing some principles from classical Cryptography, we summarize some instructions on chaos-based hash function secure construction which is beneficial to the hash function design based on chaos in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New Jersey (1999)
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. Eurocrypt, pp. 1–18. Springer, Heidelberg (2005)
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)
Chen, Z., Huang, Y.: Chaotic one way hash function. Communications Technology (7), 96–98 (2001) (in Chinese)
Liu, J., Xie, J., Wang, P.: One way hash function construction based on chaotic mappings. Journal of Tsinghua University (Sci. & Tech.) 40(7), 55–58 (2000) (in Chinese)
Wang, J., Wang, Y., Wang, M.: The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map. Acta Physica Sinica 55(10), 5048–5054 (2006) (in Chinese)
Wang, X., Zhang, J., Zhang, W.: One way hash function construction based on the extended chaotic maps switch. Acta Physica Sinica 52(11), 2737–2742 (2003) (in Chinese)
Kwok, H., Tang, W.: A Chaos Based Cryptographic Hash function for Message Authentication. International Journal of Bifurcation and Chaos 15(12), 4043–4050 (2005)
Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Communications in Nonlinear Science and Numerical Simulation 15(5), 1338–1347 (2010)
Yi, X.: Hash function based on the chaotic tent map. Transactions on Circuits and Systems 52(6), 354–357 (2005)
Xiao, D., Liao, X., Deng, S.: One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons & Fractals 24(1), 65–71 (2005)
Baranousky, A., Daems, D.: Design of one-dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation and Chaos 5(6), 1585–1598 (1995)
Wong, K.: A combined chaotic cryptographic and hashing scheme. Physics Letters A 307, 292–298 (2003)
Peng, F., Qiu, S., Long, M.: One-way Hash function construction based on two-dimensional hyper-chaotic mappings. Acta Physica Sinica 54(10), 4562–4568 (2005) (in Chinese)
Wang, S., Hu, G.: Hash function based on chaotic map lattices. Chaos 17, 023119 (2007)
Wang, Y., Liao, X., Xiao, D.: One-way hash function construction based on 2D coupled map lattices. Information Sciences 178(5), 1391–1406 (2008)
Wolf, A., Swift, J., Swinney, H., Vastano, J.: Determining Lyapunov exponents from a time series. Physica D 16, 285–317 (1985)
Li, H., Feng, D.: Composite nonlinear discrete chaotic dynamical systems and keyed hash function. Chinese Journal of Computers 26(4), 460–464 (2003) (in Chinese)
Liu, G., Shan, L., Dai, Y., Sun, J., Wang, Z.: One-way Hash function based on based on chaotic neural network. Acta Physica Sinica 55(11), 5688–5693 (2006) (in Chinese)
Wang, J., Wang, M., Wang, Y.: The collision of one keyed hash function based on chaotic map and analysis. Acta Physica Sinica 57(5), 2737–2742 (2008) (in Chinese)
Lian, S., Sun, J., Wang, Z.: Secure hash function based on neural network. Neurocomputing 69, 2346–2350 (2006)
Xiao, D., Liao, X., Deang, S.: Parallel keyed hash function construction based on chaotic maps. Physics Letters A 372(26), 4682–4688 (2008)
Xiao, D., Liao, X., Wang, Y.: Improving the security of a parallel keyed hash function based on chaotic maps. Physics Letters A 373(47), 4346–4353 (2009)
Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter. Physics Letters A 362, 439–448 (2007)
Xiao, D., Liao, X., Wong, K.: Improving the security of a dynamic look-up table based chaotic cryptosystem. IEEE Transactions on Circuits and Systems 53(6), 502–506 (2006)
Baptista, M.: Cryptography with chaos. Physics Letters A 240, 50–54 (1998)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Physics Letters A 326, 211–218 (2004)
Deng, S., Li, Y., Xiao, D.: A novel combined cryptographic and hash algorithm based on chaotic control character. Communications in Nonlinear Science and Numerical Simulation 14(11), 3889–3900 (2009)
Xiao, D., Liao, X., Wang, Y.: Collision analysis of one kind of chaos-based hash function. Physics Letters A 374(10), 1228–1231 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Xiao, D., Liao, X., Deng, S. (2011). Chaos Based Hash Function. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-20542-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20541-5
Online ISBN: 978-3-642-20542-2
eBook Packages: EngineeringEngineering (R0)