×

Collision analysis of one kind of chaos-based hash function. (English) Zbl 1236.68057

Summary: In the last decade, various chaos-based hash functions have been proposed. Nevertheless, the corresponding analyses of them lag far behind. In this Letter, we firstly take a chaos-based hash function proposed very recently by M. Amin, O. S. Faragallah and Ajmed A. Abd El-Latif as a sample to analyze its computational collision problem, and then generalize the construction method of one kind of chaos-based hash function and summarize some attentions to avoid the collision problem. It is beneficial to the hash function design based on chaos in the future.

MSC:

68P10 Searching and sorting
68T20 Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.)
65P20 Numerical chaos
Full Text: DOI

References:

[1] Kohda, T.; Tsuneda, A., IEEE Trans. Inf. Theory, 43, 104 (1997) · Zbl 0871.94021
[2] Xiang, T.; Liao, X. F.; Tang, G. P.; Chen, Y.; Wong, K. W., Phys. Lett. A, 349, 109 (2006) · Zbl 1195.81041
[3] Wong, K. W.; Kwok, B. S.-H.; Law, W. S., Phys. Lett. A, 372, 2645 (2008) · Zbl 1220.94044
[4] Wong, K. W., Phys. Lett. A, 307, 292 (2003) · Zbl 1008.94018
[5] Xiao, D.; Liao, X. F.; Deng, S. J., Chaos Solitons Fractals, 24, 65 (2005) · Zbl 1068.94019
[6] Yi, X., IEEE Trans. Circuits Systems, II, 52, 354 (2005)
[7] Lian, S. G.; Sun, J. S.; Wang, Z. Q., Neurocomputing, 69, 2346 (2006)
[8] Zhang, J. S.; Wang, X. M.; Zhang, W. F., Phys. Lett. A, 362, 439 (2007) · Zbl 1197.94155
[9] Wang, S. H.; Hu, G., Chaos, 17, 023119 (2007) · Zbl 1159.37402
[10] Xiao, D.; Liao, X. F.; Deng, S. J., Phys. Lett. A, 372, 4682 (2008) · Zbl 1221.65357
[11] Amin, M.; Faragallah, O. S.; Abd El-Latif, A. A., Chaos Solitons Fractals, 42, 767 (2009)
[12] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of Applied Cryptography (1997), CRC Press: CRC Press Boca Raton · Zbl 0868.94001
[13] Stinson, D. R., Cryptography: Theory and Practice (1995), CRC Press: CRC Press Boca Raton, FL · Zbl 0855.94001
[14] Nandi, M.
[15] I.B. Damgard, A design principle for hash functions, in: Proceedings Crypto’ 89, August 1989, pp. 416-427; I.B. Damgard, A design principle for hash functions, in: Proceedings Crypto’ 89, August 1989, pp. 416-427 · Zbl 0724.68029
[16] R.C. Merkle, One way hash functions and DES, in: Proceedings Crypto’ 89, August 1989, pp. 428-446; R.C. Merkle, One way hash functions and DES, in: Proceedings Crypto’ 89, August 1989, pp. 428-446 · Zbl 1533.94049
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.