Skip to main content
Log in

A novel Hash algorithm construction based on chaotic neural network

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

An algorithm for constructing a one-way novel Hash function based on two-layer chaotic neural network structure is proposed. The piecewise linear chaotic map (PWLCM) is utilized as transfer function, and the 4-dimensional and one-way coupled map lattices (4D OWCML) is employed as key generator of the chaotic neural network. Theoretical analysis and computer simulation indicate that the proposed algorithm presents several interesting features, such as high message and key sensitivity, good statistical properties, collision resistance and secure against meet-in-the-middle attacks, which can satisfy the performance requirements of Hash function.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Kwok HS, Tang WKS (2005) A chaos-based cryptographic Hash function for message authentication. Int J Bifur Chaos 15:4043–4050

    Article  Google Scholar 

  2. Gao W, Li F, Wang XL (2009) Chameleon Hash without key exposure based on schnorr signature. Comput Stand Interfaces 31:282–285

    Article  Google Scholar 

  3. Lian SG, Sun JS, Wang ZQ (2006) Secure Hash function based on neural network. Neurocomputing 69:2346–2350

    Article  Google Scholar 

  4. Lin IC, Ou HH, Hwang MS (2005) A user authentication system using back-propagation network. Neural Comput Appl 14:243–249

    Article  Google Scholar 

  5. Wong KW (2003) A combined chaotic cryptographic and Hashing scheme. Phys Lett A 307:292–298

    Article  MathSciNet  Google Scholar 

  6. Xiao D, Liao XF, Deng SJ (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24:65–71

    MathSciNet  Google Scholar 

  7. Yi X (2005) Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II-Express Briefs 52:354–357

    Article  Google Scholar 

  8. Zhang JS, Wang XM, Zhang WF (2007) Chaotic keyed Hash function based on feedforward–feedback nonlinear digital filter. Phys Lett A 362:439–448

    Article  Google Scholar 

  9. Wang Y, Liao XF, Xiao D, Wong KW (2008) One-way Hash function construction based on 2D coupled map lattices. Inform Sci 178:1391–1406

    Article  Google Scholar 

  10. Xiao D, Liao XF, Deng SJ (2008) Parallel keyed Hash function construction based on chaotic maps. Phys Lett A 372:4682–4688

    Article  MathSciNet  Google Scholar 

  11. Liu XD, Xiu CB (2008) Hysteresis modeling based on the hysteretic chaotic neural network. Neural Comput Applic 17:579–583

    Google Scholar 

  12. Deng SJ, Xiao D, Li YT, Peng WB (2009) A novel combined cryptographic and Hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simulat 14:3889–3900

    Article  MathSciNet  Google Scholar 

  13. Deng SJ, Li YT, Xiao D (2009) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15:1338–1347

    Article  MathSciNet  Google Scholar 

  14. Rachel MK, Einat K, Ido K,Wolfgang (2003) Public channel cryptography by synchronization of neural networks and chaotic maps. Phys Rev Lett 91:118701/1-118701/4

  15. Liu GL, Shan L, Dai YW et al (2006) One-way Hash function based on chaotic neural network. Acta Phys Sin 55:06–5688 (in Chinese)

    MathSciNet  Google Scholar 

  16. Yang HQ, Wong KW, Liao XF et al (2009) One-way Hash function construction based on chaotic map network. Chaos Solitons Fractals 41:2566–2574

    Article  Google Scholar 

  17. Xiao D, Liao XF, Wang Y (2009) Parallel keyed Hash function construction based on chaotic neural network. Neurocomputing 72:2288–2296

    Article  Google Scholar 

  18. Vanstone SA, Menezes AJ, Oorschot PC (1996) Handbook of applied cryptography. CRC Press, New York

    Google Scholar 

Download references

Acknowledgments

Our sincere thanks go to the anonymous reviewers for their valuable comments. The work described in this paper was fully funded by Project No. CDJZR10180003 supported by the Fundamental Research Funds for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yantao Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Y., Deng, S. & Xiao, D. A novel Hash algorithm construction based on chaotic neural network. Neural Comput & Applic 20, 133–141 (2011). https://doi.org/10.1007/s00521-010-0432-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-010-0432-2

Keywords

Navigation