A MATHEMATICAL MODEL OF INTEGRATED CHAOTIC BASED HASH FUNCTION TO IMPROVE RANDOMIZATION AND BIT VARIATION PROPERTIES OF CHAOTIC MAPS

Authors:

B. Madhuravani,B. Rama,N. Chandra Sekhar Reddy,B.Dhanalaxmi,V. UmaMaheswari,

DOI NO:

https://doi.org/10.26782/jmcms.2018.12.00018

Keywords:

Access Control,Authentication,Chaotic Maps,Complex Chaotic Maps,Integrity,

Abstract

In the present internet world, Security is a prime vital concern and the secure hash function is one of the ideal alternative means to guarantee security. In this paper we made a study on different nonlinear dynamical systems – Chaotic maps and introduced a novel hash scheme based on integrated chaotic maps. The experimental outcomes shows that the proposed model satisfies all cryptographic properties of secure hash functions such as resistant to collisions, high level of sensitivity to initial conditions, high confusion and diffusion, high randomization etc. The suggested model is fast and accurate in terms of speed and security is concern. In this model, multiple chaotic maps are integrated as a single chaotic system to generate an n-bit digest value, where the length of digest is flexible in terms of security is concern.

Refference:

I.A Kanso , H. Yahyaoui b, M. Almulla, “Keyed hash function based on a chaotic map”,Information Sciences 186 (2012) 249–264, Elsevier.

II.A Kanso, M. Ghebleh, “A fast and efficient chaos-based keyed hash function”, Commun Nonlinear Sci Numer Simulat 18 (2013) 109–123, Elsevier.

III.B Madhuravani, Dr. D.S.R. Murthy, “An Efficient Authentication Protocol to amplify collision resistance using Dynamic Cryptographic Hash Function & LSB Hop based Image Steganographic Technique”, International Journal of Applied Engineering Research, Volume 11, Number 7 PgNos: 5293-5296.(2016), ISSN 0973-4562.

IV.B Madhuravani, Dr. D.S.R. Murthy, “A NOVEL NODE INTEGRITY BASED AUTHENTICATION MODEL FOR DYNAMIC WIRELESS COMMUNCATION NETWORKS”, Journal of Advanced Research in Dynamical and Control Systems, ISSN: 1943-023X Issue: 12-Special Issue, (2017), Pages: 1145-1169.

V.Dean RD. Formal Aspects of Mobile Code Security. PhD thesis, Princeton University; (1999).

VI.Di Xiao a,b,, Xiaofeng Liao a, Shaojiang Deng , “Parallel keyed hash function construction based on chaotic maps”, Physics Letters A 372 (2008) 4682–4688, Elsevier.

VII.Di Xiao a, Xiaofeng Liao a, Yong Wanga,‟Improving the security of a parallel keyed hash function based on chaotic maps”, Physics Letters A 373 (2009) 4346–4353, Elsevier.

VIII.Joux A. Multicollisions in iterated hash functions. In: CRYPTO‟04, LNCS, vol. 3152; (2004). p. 306–16.

IX.Meysam Asgari Chenaghlu ∗, Shahram Jamali, Narjes Nikzad Khasmakhi,” A novel keyed parallel hashing scheme based on a new chaotic system”, Chaos, Solitons and Fractals 87 (2016) 216–225.

X.N. Chandra Sekhar Reddy, Dr. Purna Chandra Rao Vemuri, Dr. A. Govardhan, Ch. Vijay, “An empirical study on feature extraction techniques for Intrusion Detection system”, Journal of Advanced Research in Dynamicaland Control Systems, ISSN: 1943-023X Issue: 12-Special Issue, (2017),Pages: 1118-1130.

XI.NIST, Secure hash standard (SHS), federal information processing standards 180; (1993).

XII.NIST, secure hash standard (SHS), federal information processing standards 180-1; (1995).

XIII.NIST, secure hash standard (SHS), federal information processing standards 180-2; (2002).

XIV.Rivest R. The MD4 message digest algorithm. In: CRYPTO‟90, LNCS, vol. 537; 1991. p. 303–11.

XV.Rivest R. The MD5 message digest algorithm, request for comments (RFC) 1321. Internet engineering task force; (1992).

XVI.Shaojiang Deng, Yantao Li *, Di Xiao, «Analysis and improvement of a chaos-based Hash function construction”, Commun Nonlinear Sci Numer Simulat 15 (2010) 1338–1347, Elsevier.

XVII.Tian-Fu Lee, Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption, Nonlinear Dynamics ,2014, vol 10,pp 23-43.

XVIII.Yantao Li ,Di Xiao, Parallel chaotic Hash function construction based on cellular neural network, Neural Comput & Applic (2012) 21:1563–1573.

Author(s): B. Madhuravani, B. Rama, N. Chandra Sekhar Reddy, B.Dhanalaxmi, V. UmaMaheswari View Download