DocumentCode :
941677
Title :
Hash function based on chaotic tent maps
Author :
Yi, Xun
Author_Institution :
Sch. of Comput. Sci. & Math., Victoria Univ., Melbourne City, Vic., Australia
Volume :
52
Issue :
6
fYear :
2005
fDate :
6/1/2005 12:00:00 AM
Firstpage :
354
Lastpage :
357
Abstract :
In cryptographic applications, hash functions are used within digital signature schemes to provide data integrity (e.g., to detect modification of an original message). In this brief, we propose a new 2ℓ -bit iterated hash function based on chaotic tent maps. This hash function can be expected to have at least the same computational security against target attack, free-start target attack, collision attack, semi-free-start collision attack, and free-start collision attack as DM scheme.
Keywords :
chaotic communication; cryptography; data integrity; digital signatures; telecommunication security; chaotic tent maps; cryptographic applications; data integrity; digital signature schemes; hash function; secure communication; Chaos; Chaotic communication; Cryptography; Data security; Delta modulation; Digital signatures; Logistics; Performance analysis; Random number generation; Table lookup; Chaotic tent map; cryptography; hash function; secure communication;
fLanguage :
English
Journal_Title :
Circuits and Systems II: Express Briefs, IEEE Transactions on
Publisher :
ieee
ISSN :
1549-7747
Type :
jour
DOI :
10.1109/TCSII.2005.848992
Filename :
1453753
Link To Document :
بازگشت