Hash function based on chaotic tent maps

被引:98
作者
Yi, X [1 ]
机构
[1] Victoria Univ, Sch Comp Sci & Math, Melbourne, Vic 8001, Australia
关键词
chaotic tent map; cryptography; hash function; secure communication;
D O I
10.1109/TCSII.2005.848992
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cryptographic applications, hash functions are used within digital signature schemes to provide data integrity (e.g., to detect modification of an original message). In this brief, we propose a new 2l-bit iterated hash function based on chaotic tent maps. This hash function can be expected to have at least the same computational security against target attack, free-start target attack, collision attack, semi-free-start collision attack, and free-start collision attack as DM scheme.
引用
收藏
页码:354 / 357
页数:4
相关论文
共 14 条
[1]  
[Anonymous], IBM TECH DISCL B
[2]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[3]  
BIHAM E, 1991, P ADV CRYPT EUROCRYP, P532
[4]  
DAVIES R, 1984, P INT C COMP COMM SY, P843
[5]  
*FIBS, 1993, FIPS PUB, V180
[6]  
GOLDFRIED MR, 1991, J PSYCHOTHERAPY INTE, V1, P5
[7]  
HABUTSU T, 1991, P EUR 91, P127
[8]   Chaos and cryptography: Block encryption ciphers based on chaotic maps [J].
Jakimoski, G ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) :163-169
[9]  
LAI X, 1992, P EUR 92 HUNG MAY, P55
[10]  
Merkle R.C., 1989, P CRYPTO 89, P428