Title :
Hash function based on chaotic tent maps
Author_Institution :
Sch. of Comput. Sci. & Math., Victoria Univ., Melbourne City, Vic., Australia
fDate :
6/1/2005 12:00:00 AM
Abstract :
In cryptographic applications, hash functions are used within digital signature schemes to provide data integrity (e.g., to detect modification of an original message). In this brief, we propose a new 2ℓ -bit iterated hash function based on chaotic tent maps. This hash function can be expected to have at least the same computational security against target attack, free-start target attack, collision attack, semi-free-start collision attack, and free-start collision attack as DM scheme.
Keywords :
chaotic communication; cryptography; data integrity; digital signatures; telecommunication security; chaotic tent maps; cryptographic applications; data integrity; digital signature schemes; hash function; secure communication; Chaos; Chaotic communication; Cryptography; Data security; Delta modulation; Digital signatures; Logistics; Performance analysis; Random number generation; Table lookup; Chaotic tent map; cryptography; hash function; secure communication;
Journal_Title :
Circuits and Systems II: Express Briefs, IEEE Transactions on
DOI :
10.1109/TCSII.2005.848992