scispace - formally typeset
Journal ArticleDOI

Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network

Reads0
Chats0
TLDR
The theoretical analysis shows that the improved scheme is more secure than the original one, and it can also keep the parallel merit and other performance advantages of the original scheme.
Abstract
This paper analyzes the security of a chaotic parallel keyed hash function in detail, and points out that it is susceptible to two kinds of forgery attacks and weak key attack (which results in MAC collision). To remedy such security flaws, an improved scheme is further proposed, and its security and performance are also discussed. The theoretical analysis shows that the improved scheme is more secure than the original one. In the meanwhile, it can also keep the parallel merit and other performance advantages of the original scheme.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems

TL;DR: An anonymous and provably secure two-factor authentication protocol based on ECC that is analyzed with the random oracle model and demonstrated to be formally secured against the hardness assumption of computational Diffie-Hellman problem.
Journal ArticleDOI

Secure chaotic system with application to chaotic ciphers

TL;DR: Theoretical analysis and simulation results demonstrate that both the SCS criteria and the DDF reference model can be used to overcome the problems caused by the dynamical properties of the underlying chaotic systems and increase the security of chaotic ciphers.
Journal ArticleDOI

A novel keyed parallel hashing scheme based on a new chaotic system

TL;DR: A new chaotic system is proposed and employed to design a secure and fast hash function, which has a dynamic random array of functions and can be implemented by a parallel architecture and proves security of the proposed function.
Journal ArticleDOI

A chaos-based keyed hash function based on fixed point representation

TL;DR: Security evaluation indicates that the proposed hash function has near-perfect statistical properties which include diffusion, confusion, collision resistance and distribution, making it a viable hash function for practical implementation.
Journal ArticleDOI

Geographic wormhole detection in wireless sensor networks.

TL;DR: A novel scheme to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet to detect wormhole attacks in a geographic routing protocol (DWGRP).
References
More filters
Journal ArticleDOI

A combined chaotic cryptographic and hashing scheme

TL;DR: The chaotic cryptographic scheme is generalized so that it can perform both encryption and hashing to produce the cipher text as well as the hash value for a given message.
Journal ArticleDOI

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

TL;DR: This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA that provides secure, robust, and trustworthy remote authentication of mobile users over insecure network.
Journal ArticleDOI

Hash function based on chaotic tent maps

TL;DR: This brief proposes a new 2/spl lscr/ -bit iterated hash function based on chaotic tent maps that can be expected to have at least the same computational security against target attack, free-start target attacked, collision attack, semi-free-start collision attack and free- start collision attack as DM scheme.
Journal ArticleDOI

One-way hash function construction based on 2D coupled map lattices

TL;DR: An algorithm for constructing one-way hash function based on spatiotemporal chaos with good statistical properties, strong collision resistance and high flexibility is proposed, with high potential to be adopted as a strong hash function for providing data integrity.
Journal ArticleDOI

Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter

TL;DR: An n-dimensional chaotic dynamic system named feedforward–feedback nonlinear filter is constructed, and a novel chaotic keyed hash algorithm using FFNF is proposed that satisfies the requirement of keyed Hash function, and it is easy to implement by the filter structure.
Related Papers (5)