Skip to main content
Log in

An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack

  • Regular research paper
  • Published:
Memetic Computing Aims and scope Submit manuscript

Abstract

In this paper, the chaos-based hash function is analyzed, then an improved version of chaos-based hash function is presented and discussed using chaotic neural networks. It is based on the piecewise linear chaotic map that is used as a transfer function in the input and output of the neural network layer. The security of the improved hash function is also discussed and a novel type of collision resistant hash function called semi-collision attack is proposed, which is based on the collision percentage between the two hash values. In the proposed attack particle swarm optimization algorithm is used to define the fitness function parameters. Finally, numerical and simulation results provides strong collision resistance and high performance efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Vidali J, Nose P, Pas̆alić E (2010) Collisions for variants of the BLAKE hash function. Inf Process Lett 110:585–590

    Article  MATH  Google Scholar 

  2. Wang S, Li D, Zhou H (2012) Collision analysis of a chaos-based hash function with both modification detection and localization capability. Commun Nonlinear Sci Numer Simulat 17:780–784

    Article  MathSciNet  Google Scholar 

  3. Wang X, Zhao J (2010) Cryptanalysis on a parallel keyed hash function based on chaotic neural network. Neurocomputing 73:3224–3228

    Article  Google Scholar 

  4. Xingyuan W, Guoxiang H (2011) Cryptanalysis on a novel image encryption method based on total shuffling scheme. Optics Commun 284(24):5804–5807

    Article  Google Scholar 

  5. Xiao D, Liao X, Deng S (2008) Parallel keyed hash function construction based on chaotic maps. Phys Lett A 372:4682–4688

    Article  MathSciNet  MATH  Google Scholar 

  6. Wang X, He D, Cao Y (2009) Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys Lett A 373:3201–3206

    Article  MathSciNet  MATH  Google Scholar 

  7. Xiao D, Liao X, Wang Y (2009) Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72:2288–2296

    Article  Google Scholar 

  8. Laskari EC, Meletiou GC, Stamation YC, Vrahatis MN (2005) Evolutionary Computation based Cryptanalysis: A first study. Nonlinear Anal 63:823–830

    Article  MathSciNet  Google Scholar 

  9. Xiao D, Li Y, Deng S (2011) Parallel Hash function construction based on chaotic maps with changeable parameters. Neural Comput Appl 20:1305–13012

    Article  Google Scholar 

  10. Kennedy J, Eberhart RC (1995) Particle swarm optimization. Proceedings of the IEEE International Conference on Neural Networks IV:1942–1948

  11. Shahzad W, Siddiqui AB, Khan FA (2009) Cryptanalysis of Four-Round DES using Binary Particle Swarm Optimization. Genetic and Evolutionary Computation Conference \((GECCO)\), pp 1757–1758

  12. Ghonaim WA, Ghali NI, Hassanien AE, Abraham A (2011) Known-plaintext attack of DES-16 using Particle Swarm Optimization. Nature and Biologically Inspired Computing \((NaBIC)\), pp 12–16

  13. Abraham A (2005) Artificial Neural Networks. Handbook of Measuring System Design

  14. Cathy W (1997) Artificial neural networks for molecular sequence analysis. Comput Chem 21:237–256

    Article  Google Scholar 

  15. Wang Y, Wong KW, Xiao D (2011) Parallel hash function construction based on coupled map lattices. Commun Nonlinear Sci Numer Simulat 16:2810–2821

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aboul Ella Hassanien.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ghonaim, W., Ghali, N.I., Hassanien, A.E. et al. An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack. Memetic Comp. 5, 179–185 (2013). https://doi.org/10.1007/s12293-013-0113-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12293-013-0113-7

Keywords

Navigation