Keyed hash function based on a chaotic map

  • Authors:
  • A. Kanso;H. Yahyaoui;M. Almulla

  • Affiliations:
  • Department of Mathematics, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait;Computer Science Department, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait;Computer Science Department, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2012

Quantified Score

Hi-index 0.07

Visualization

Abstract

Secure hash functions play a fundamental role in cryptographic and Web applications. They are mainly used, within digital signature schemes, to verify the integrity and authenticity of information. In this paper, we propose a simple and efficient keyed hash function based on a single chaotic map. Theoretical and simulation results demonstrate that the suggested scheme satisfies all cryptographic requirements of secure keyed hash functions such as strong confusion and diffusion capability, good collision resistance, high sensitivity to message and secret key, etc. Furthermore, it is fast and can be easily implemented through software or hardware. Moreover, the length of the hash value is flexible without any impact on the algorithm. This function is shown to have better statistical performance than many existing hash functions. Thus, the suggested hash function seems to be a good candidate as a secure keyed hash function for use in cryptographic applications.