Journal ArticleDOI
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
Reads0
Chats0
TLDR
The theoretical analysis shows that the improved scheme is more secure than the original one, and it can also keep the parallel merit and other performance advantages of the original scheme.Abstract:
This paper analyzes the security of a chaotic parallel keyed hash function in detail, and points out that it is susceptible to two kinds of forgery attacks and weak key attack (which results in MAC collision). To remedy such security flaws, an improved scheme is further proposed, and its security and performance are also discussed. The theoretical analysis shows that the improved scheme is more secure than the original one. In the meanwhile, it can also keep the parallel merit and other performance advantages of the original scheme.read more
Citations
More filters
Journal ArticleDOI
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
TL;DR: An anonymous and provably secure two-factor authentication protocol based on ECC that is analyzed with the random oracle model and demonstrated to be formally secured against the hardness assumption of computational Diffie-Hellman problem.
Journal ArticleDOI
Secure chaotic system with application to chaotic ciphers
TL;DR: Theoretical analysis and simulation results demonstrate that both the SCS criteria and the DDF reference model can be used to overcome the problems caused by the dynamical properties of the underlying chaotic systems and increase the security of chaotic ciphers.
Journal ArticleDOI
A novel keyed parallel hashing scheme based on a new chaotic system
TL;DR: A new chaotic system is proposed and employed to design a secure and fast hash function, which has a dynamic random array of functions and can be implemented by a parallel architecture and proves security of the proposed function.
Journal ArticleDOI
A chaos-based keyed hash function based on fixed point representation
TL;DR: Security evaluation indicates that the proposed hash function has near-perfect statistical properties which include diffusion, confusion, collision resistance and distribution, making it a viable hash function for practical implementation.
Journal ArticleDOI
Geographic wormhole detection in wireless sensor networks.
Mehdi Sookhak,Adnan Akhundzada,Alireza Sookhak,Mohammadreza Eslaminejad,Abdullah Gani,Muhammad Khurram Khan,Xiong Li,Xiaomin Wang +7 more
TL;DR: A novel scheme to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet to detect wormhole attacks in a geographic routing protocol (DWGRP).
References
More filters
Journal ArticleDOI
A combined chaotic cryptographic and hashing scheme
TL;DR: The chaotic cryptographic scheme is generalized so that it can perform both encryption and hashing to produce the cipher text as well as the hash value for a given message.
Journal ArticleDOI
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
TL;DR: This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA that provides secure, robust, and trustworthy remote authentication of mobile users over insecure network.
Journal ArticleDOI
Hash function based on chaotic tent maps
TL;DR: This brief proposes a new 2/spl lscr/ -bit iterated hash function based on chaotic tent maps that can be expected to have at least the same computational security against target attack, free-start target attacked, collision attack, semi-free-start collision attack and free- start collision attack as DM scheme.
Journal ArticleDOI
One-way hash function construction based on 2D coupled map lattices
TL;DR: An algorithm for constructing one-way hash function based on spatiotemporal chaos with good statistical properties, strong collision resistance and high flexibility is proposed, with high potential to be adopted as a strong hash function for providing data integrity.
Journal ArticleDOI
Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter
TL;DR: An n-dimensional chaotic dynamic system named feedforward–feedback nonlinear filter is constructed, and a novel chaotic keyed hash algorithm using FFNF is proposed that satisfies the requirement of keyed Hash function, and it is easy to implement by the filter structure.