Abstract
A new parallel chaotic Hash function, based on four-dimensional cellular neural network, is proposed in this paper. The message is expanded by iterating chaotic logistic map and then divided into blocks with a length of 512 bits each. All blocks are processed in a parallel mode, which is one of the significant characteristics of the proposed algorithm. Each 512-bit block is divided into four 128-bit sub-blocks, each of which is further separated into four 32-bit values and then the four values are mixed into four new values generated by chaotic cat map. The obtained four new values are performed by the bit-wise exclusive OR operation with four initial values or previously generated four values, and then, they are used as the inputs of cellular neural network. By iterating cellular neural network, another four values as the middle Hash value are generated. The generated values of all blocks are inputted into the compression function to produce the final 128-bit Hash value. Theoretical analysis and computer simulation indicate that the proposed algorithm satisfies the requirements of a secure Hash function.
Similar content being viewed by others
References
Sklavos N, Alexopoulos E, Koufopavlou O (2003) Networking data integrity: high speed architectures and hardware implementations. Int Arab J Inf Technol 1:54–59
Tsudik G (1992) Message authentication with one-way hash functions. ACM SIGCOMM Comput Commun Rev 22:29–38
Rompel J (1990) One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22th annual ACM symposium on Theory of computing. ACM, Baltimore, pp 387–394
Rivest R (1992) The MD5 Message-Digest Algorithm, RFC 1321, MIT LCS and RSA Data Security Inc
SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1 (1993) Available: http://www.itl.nist.gov/fipspubs/fip180-1.htm
Wang XY, Yin YQ, Yu HB (2005) Finding collisions in the full SHA-1, advances in cryptology-crypto 05. LNCS 3621:17–36
Wong KW (2003) A combined chaotic cryptographic and hashing scheme. Phy Lett A 307:292–298
Kwok HS, Tang WKS (2005) A chaos-based cryptographic hash function for message authentication. Int J Bifurcation Chaos 15:4043–4050
Xiao D, Liao XF, Deng SJ (2005) One-way Hash function construction based on the chaotic map with changeable parameter. Chaos Solitons Fractals 24:65–71
Guo XF, Zhang JS (2006) Keyed one-way Hash function construction based on the chaotic dynamic S-Box. Acta Phys Sin 55:4442–4449
Wang Y, Liao XF, Xiao D et al (2008) One-way hash function construction based on 2D coupled map lattices. Inf Sci 178:1391–1406
Akhavan A, Samsudin A, Akhshani A (2009) Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fractals 42:1046–1053
Amin M, Faragallah OS, El-latif AAA (2009) Chaos-based hash function (CBHF) for cryptographic applications. Chaos Solitons Fractals 42:767–772
Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Neurocomputing 69:2346–2350
Liu GJ, Shan L, Dai YW et al (2006) One-way Hash function based on chaotic neural network. Acta Phys Sin 55:5688–5693
Yang QT, Gao TG (2008) One-way hash function based on hyper-chaotic cellular neural network. Chin Phys B 17:2388–2393
Li YT, Deng SJ, Xiao D (2011) A novel Hash algorithm construction based on chaotic neural network. Neural Comput Appl 20:133–141
Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21:749–761
Eckmann JP, Ruelle D (1985) Ergodic theory of chaos and strange attractors. Rev Mod Phys 57:617–656
Zhang CN, Lai CR (2004) A systematic approach for encryption and authentication with fault tolerance. Comput Netw 45:143–154
Acknowledgments
Our sincere thanks go to the anonymous reviewers for their valuable comments. The work described here was supported by the Fundamental Research Funds for the Central Universities (Grant No. CDJXS10182215), the National Natural Science Foundation of China (Grant Nos. 61070246, 61003247, 60873201), the Program for New Century Excellent Talents in University of China (NCET-09-0838, NCET-08-0603), the Natural Science Foundation Project of CQ CSTC (Grant Nos. 2010BB2047, 2009BB2211).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, Y., Xiao, D., Li, H. et al. Parallel chaotic Hash function construction based on cellular neural network. Neural Comput & Applic 21, 1563–1573 (2012). https://doi.org/10.1007/s00521-011-0726-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-011-0726-z