Title
Keyed hash function based on a chaotic map
Abstract
Secure hash functions play a fundamental role in cryptographic and Web applications. They are mainly used, within digital signature schemes, to verify the integrity and authenticity of information. In this paper, we propose a simple and efficient keyed hash function based on a single chaotic map. Theoretical and simulation results demonstrate that the suggested scheme satisfies all cryptographic requirements of secure keyed hash functions such as strong confusion and diffusion capability, good collision resistance, high sensitivity to message and secret key, etc. Furthermore, it is fast and can be easily implemented through software or hardware. Moreover, the length of the hash value is flexible without any impact on the algorithm. This function is shown to have better statistical performance than many existing hash functions. Thus, the suggested hash function seems to be a good candidate as a secure keyed hash function for use in cryptographic applications.
Year
DOI
Venue
2012
10.1016/j.ins.2011.09.008
Inf. Sci.
Keywords
Field
DocType
hash function,cryptographic requirement,cryptographic application,chaotic map,hash value,efficient keyed hash,good candidate,secure hash function,secure keyed hash function,existing hash function,good collision resistance,cryptography
SHA-2,Cryptographic hash function,Collision resistance,Theoretical computer science,Hash function,Secure Hash Standard,Hash chain,Mathematics,MDC-2,Secure Hash Algorithm
Journal
Volume
Issue
ISSN
186
1
0020-0255
Citations 
PageRank 
References 
21
1.09
21
Authors
3
Name
Order
Citations
PageRank
A. Kanso19511.76
H. Yahyaoui2303.32
M. Almulla3251.85