A design principle for hash functions
CRYPTO '89 Proceedings on Advances in cryptology
One way hash functions and DES
CRYPTO '89 Proceedings on Advances in cryptology
The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Predicting a chaotic time series using a fuzzy neural network
Information Sciences: an International Journal
Handbook of Applied Cryptography
Handbook of Applied Cryptography
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Study of chaos functions for their suitability in generating Message Authentication Codes
Applied Soft Computing
TestU01: A C library for empirical testing of random number generators
ACM Transactions on Mathematical Software (TOMS)
One-way hash function construction based on 2D coupled map lattices
Information Sciences: an International Journal
True random number generator based on mouse movement and chaotic hash function
Information Sciences: an International Journal
Compression-unimpaired batch-image encryption combining vector quantization and index compression
Information Sciences: an International Journal
Cryptanalysis of the hash functions MD4 and RIPEMD
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Personalized information encryption using ECG signals with chaotic functions
Information Sciences: an International Journal
Keyed hash function based on a dynamic lookup table of functions
Information Sciences: an International Journal
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
Journal of Systems and Software
Hi-index | 0.07 |
Secure hash functions play a fundamental role in cryptographic and Web applications. They are mainly used, within digital signature schemes, to verify the integrity and authenticity of information. In this paper, we propose a simple and efficient keyed hash function based on a single chaotic map. Theoretical and simulation results demonstrate that the suggested scheme satisfies all cryptographic requirements of secure keyed hash functions such as strong confusion and diffusion capability, good collision resistance, high sensitivity to message and secret key, etc. Furthermore, it is fast and can be easily implemented through software or hardware. Moreover, the length of the hash value is flexible without any impact on the algorithm. This function is shown to have better statistical performance than many existing hash functions. Thus, the suggested hash function seems to be a good candidate as a secure keyed hash function for use in cryptographic applications.