Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (3): 1-15.doi: 10.11959/j.issn.2096-109x.2023033
• Papers • Next Articles
Liquan CHEN1,2, Yuhang ZHU1, Yu WANG1, Zhongyuan QIN1, Yang MA1
Revised:
2022-11-11
Online:
2023-06-25
Published:
2023-06-01
Supported by:
CLC Number:
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA. New hash function based on C-MD structure and chaotic neural network[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 1-15.
"
条件 | 散列值 |
1 | 6BC35778C2CB3219D4DDE819655B04A521AA1A FE792638D0CB4E23240017DE0F |
2 | 8148C288C3C6CF5B0A9E7FF0579F6A276237F313 C3393B210706B6641279B983 |
3 | CFE8EB351410CA6C8CBA42037B950340BD9117D 4EAD2751613A2D1DC628CE85F |
4 | A0A84576903A0FB0B7945C7CFED47A6FF25A427 DD12CC343B72D5D2CCE78A238 |
5 | 7406B5B68EDDA9D39467E939E7B430DB4D497C9 1F1E0B03F509509DE5507AE96 |
6 | F3D04C5A3C931EBF0AA8C83E9957425459BD7DF FF7AA4982425B8371A5653128 |
"
算法 | P | ?B | ?P | Bmin | Bmax | |
MD5 | 64.03 | 50.02 | 5.660 0 | 4.42 | 40 | 82 |
文献[ | 63.88 | 49.91 | 5.750 0 | 4.50 | — | — |
文献[ | 63.99 | 49.99 | 5.660 0 | 4.40 | 40 | 85 |
文献[ | 63.92 | 43.94 | 7.430 5 | 5.80 | — | — |
文献[ | 64.02 | 50.01 | 5.640 0 | 4.40 | — | — |
文献[ | 64.00 | 50.00 | 5.440 0 | 4.25 | — | — |
文献[ | 63.91 | 49.94 | 5.617 2 | 4.39 | — | — |
文献[ | 63.15 | 50.11 | 5.770 0 | 4.51 | — | — |
文献[ | 63.88 | 49.91 | 5.660 0 | 4.41 | 42 | 84 |
C-MDhash (128 bit) | 64.04 | 50.03 | 5.570 1 | 4.35 | 43 | 85 |
文献[ | 127.98 | 50.04 | 8.106 0 | 3.12 | 99 | 156 |
文献[ | 127.70 | 49.88 | 8.220 0 | 3.21 | 99 | 156 |
SHA-2 (256 bit) | 128.81 | 50.03 | 8.109 3 | 3.56 | 100 | 155 |
SHA-3 (256 bit) | 128.43 | 50.10 | 8.109 3 | 3.76 | 100 | 155 |
C-MDhash (256 bit) | 127.99 | 50.00 | 8.075 2 | 3.15 | 99 | 157 |
"
指标 | P-value通过率 | 结果 |
Frequency | 100% | Random |
Frequency within a Block | 100% | Random |
Run | 100% | Random |
Longest Run of Ones in a Block | 100% | Random |
Binary Matrix Rank | 100% | Random |
Discrete Fourier Transform | 100% | Random |
Non-Overlapping Template Matching | 100% | Random |
Overlapping Template Matching | 100% | Random |
Maurer's Universal Statistical | 100% | Random |
Linear Complexity | 100% | Random |
Serial | 100% | Random |
Approximate Entropy | 100% | Random |
Cummulative Sums (Forward) | 100% | Random |
Cummulative Sums (Reverse) | 100% | Random |
Random Excursions | 100% | Random |
Random Excursions Variant | 100% | Random |
"
算法 | Max | Min | Mean |
MD5 (128 bit) | 2 074 | 590 | 1 304 |
SHA-2 (256 bit) | 3 819 | 1 789 | 2 707.10 |
SHA-3 (256 bit) | 3 895 | 1 686 | 2 776.16 |
文献[ | 2 312 | 683 | 1 504 |
文献[ | 2 397 | 403 | 1 364 |
文献[ | 2 221 | 696 | 1 506 |
文献[ | 2 321 | 584 | 1 366 |
文献[ | 2 379 | 630 | 1 360.9 |
文献[ | 2 156 | 658 | 1 431.3 |
文献[ | 2 213 | 730 | 1 426.23 |
文献[ | — | — | 2 715 |
文献[ | 3 831 | 1 695 | 2 715.39 |
文献[ | 2 418 | 796 | 1 598.6 |
C-MDhash (128 bit) | 2 168 | 517 | 1 380 |
C-MDhash (256 bit) | 4 125 | 1 553 | 2 840.07 |
"
算法 | 速率/(Gbit.s-1) | 平台 |
MD5 | 4.758 | Intel Core i7, 32 GB RAM |
SHA-2 (256 bit) | 2.120 | Intel Core i7, 32 GB RAM |
SHA-3(256 bit) | 2.622 | Intel Core i7, 32 GB RAM |
文献[ | 0.666 | Intel Core i7, 16 GB RAM |
文献[ | 2.550 | Intel Core i7, 16 GB RAM |
文献[ | 1.234 | Intel Core i5, 8 GB RAM |
文献[ | 0.697 | Intel Core i7, 16 GB RAM |
文献[ | 0.933 | Intel Core i5, 16 GB RAM |
C-MDhash (256 bit) | 3.060 | Intel Core i7, 8 GB RAM |
[1] | LIN Z , GUYEUX C , YU S ,et al. On the use of chaotic iterations to design keyed hash function[J]. Cluster Computing, 2019,22(1). |
[2] | ISLAM S H . Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps[J]. Nonlinear Dynamics, 2014,78(3). |
[3] | CHAIN K , KUO W . A new digital signature scheme based on chaotic maps[J]. Nonlinear dynamics, 2013,74(4): 1003-1012. |
[4] | DATCU O , MACOVEI C , HOBINCU R . Chaos based cryptographic pseudo-random number generator template with dynamic state change[J]. Applied Sciences. 2020,10(2). |
[5] | WANG M , WANG X , ZHAO T ,et al. Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme[J]. Information Sciences, 2021,544: 1-24. |
[6] | WANG Y , LIAO X , XIAO D ,et al. One-way hash function construction based on 2D coupled map lattices[J]. Information Sciences. 2008,178(5): 1391-1406. |
[7] | WANG X , YU H . How to break MD5 and other hash functions[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005. 19-35. |
[8] | WANG X , YIN Y L , YU H . Finding collisions in the full SHA-1[C]// Annual International Cryptology Conference. 2005. 17-36. |
[9] | GILBERT H , HANDSCHUH H . Security analysis of SHA-256 and sisters[C]// International Workshop on Selected Areas in Cryptography. 2003. 175-193. |
[10] | HAWKES P , PADDON M , ROSE G G . On corrective patterns for the SHA-2 family[J]. IACR Cryptol.ePrint Arch.2004, 2004:207. |
[11] | TUTUEVA A V , KARIMOV A I , MOYSIS L ,et al. Construction of one-way hash functions with increased key space using adaptive chaotic maps[J]. Chaos,Solitons & Fractals, 2020,141:110344. |
[12] | LI Y , XIAO D , DENG S ,et al. Parallel Hash function construction based on chaotic maps with changeable parameters[J]. Neural Computing and Applications. 2011,20(8): 1305-1312. |
[13] | HE B , LEI P , PU Q ,et al. A method for designing hash function based on chaotic neural network[C]// International Workshop on Cloud Computing and Information Security (CCIS). 2013. |
[14] | ROSENBLATT F . The perceptron:a probabilistic model for information storage and organization in the brain[J]. Psychological Review. 1958,65(6): 386. |
[15] | LORENZ E N . Deterministic nonperiodic flow[J]. Journal of Atmospheric Sciences, 1963,20(2): 130-141. |
[16] | HILBORN R C . Chaos and nonlinear dynamics:an introduction for scientists and engineers[M]. Oxford University Press on Demand, 2000. |
[17] | DACHSELT F , SCHWARZ W . Chaos and cryptography[J]. IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications. 2001,48(12): 1498-1509. |
[18] | TEH J S , SAMSUDIN A , AKHAVAN A . Parallel chaotic hash function based on the shuffle-exchange network[J]. Nonlinear Dynamics. 2015,81(3): 1067-1079. |
[19] | XIAO D , LIAO X . A combined hash and encryption scheme by chaotic neural network[C]// International Symposium on Neural Networks. Springer, 2004. 633-638. |
[20] | LIAN S , SUN J , WANG Z . Secure hash function based on neural network[J]. Neurocomputing, 2006,69(16-18): 2346-2350. |
[21] | LIAN S , LIU Z , REN Z ,et al. Hash function based on chaotic neural networks[C]// 2006 IEEE International Symposium on Circuits and Systems. 2006.4. |
[22] | YANG H , WONG K , LIAO X ,et al. One-way hash function construction based on chaotic map network[J]. Chaos,Solitons &Fractals. 2009,41(5): 2566-2574. |
[23] | HUANG Z . A more secure parallel keyed hash function based on chaotic neural network[J]. Communications in Nonlinear Science and Numerical Simulation. 2011,16(8): 3245-3256. |
[24] | ABDOUN N . Design,implementation and analysis of keyed hash functions based on chaotic maps and neural networks[R]. 2019. |
[25] | KANEKO K . Pattern dynamics in spatiotemporal chaos:Pattern selection,diffusion of defect and pattern competition intermittency[J]. Physica D:Nonlinear Phenomena. 1989,34(1-2): 1-41. |
[26] | CORON J , DODIS Y , MALINAUD C ,et al. Merkle-damg?rd revisited:how to construct a hash function[C]// Annual International Cryptology Conference. 2005. 430-448. |
[27] | MERKLE R C . Secrecy,authentication,and public key systems[R]. Stanford University, 1979. |
[28] | SHANNON C E . Communication theory of secrecy systems[J]. The Bell System Technical Journal. 1949,28(4): 656-715. |
[29] | FEISTEL H . Cryptography and computer privacy[J]. Scientific American. 1973,228(5): 15-23. |
[30] | LI Y , GE G , XIA D . Chaotic hash function based on the dynamic S-box with variable parameters[J]. Nonlinear Dynamics. 2016,84(4): 2387-2402. |
[31] | XIAO D , LIAO X , DENG S . One-way hash function construction based on the chaotic map with changeable-parameter[J]. Chaos,Solitons & Fractals. 2005,24(1): 65-71. |
[32] | TEH J S , ALAWIDA M , HO J J . Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic[J]. Nonlinear Dynamics. 2020,100(1): 713-729. |
[33] | TEH J S , TAN K , ALAWIDA M . A chaos-based keyed hash function based on fixed point representation[J]. Cluster Computing. 2019,22(2): 649-660. |
[34] | XIAO D , LIAO X , DENG S . Parallel keyed hash function construction based on chaotic maps[J]. Physics Letters A. 2008,372(26): 4682-4688. |
[35] | HUANG W , WANG L . A hash function based on sponge structure with chaotic map for spinal codes[C]// 2019 International Conference on Computer,Information and Telecommunication Systems (CITS). IEEE, 2019. 1-5. |
[36] | ABDOUN N , EL ASSAD S , DEFORGES O ,et al. Design and security analysis of two robust keyed hash functions based on chaotic neural networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2020,11(5): 2137-2161. |
[37] | ALAWIDA M , SAMSUDIN A , ALAJARMEH N ,et al. A novel hash function based on a chaotic sponge and DNA sequence[J]. IEEE Access, 2021,9: 17882-17897. |
[38] | ABDOUN N , EL ASSAD S , MANH HOANG T ,et al. Designing two secure keyed hash functions based on sponge construction and the chaotic neural network[J]. Entropy, 2020,22(9): 1012. |
[39] | JOUX A . Multicollisions in iterated hash functions.Application to cascaded constructions[C]// Annual International Cryptology Conference. 2004: 306-316. |
[40] | LUO Y L , DU M H . One-way hash function construction based on the spatiotemporal chaotic system[J]. Chinese Physics B. 2012,21(6): 60503. |
[41] | LIU H , KADIR A , LIU J . Keyed hash function using hyper chaotic system with time-varying parameters perturbation[J]. IEEE Access. 2019,7: 37211-37219. |
[42] | AHMAD M , KHURANA S , SINGH S ,et al. A simple secure hash function scheme using multiple chaotic maps[J]. 3D Research. 2017,8(2): 13. |
[1] | Xuhong LIU, Chen SUN. Private-preserving scientific computation of the rational numbers [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 97-110. |
[2] | Long GAO,Chun-ming TANG,Yong-qiang ZHANG. Multi-parties key agreement protocol based on elliptic curve [J]. Chinese Journal of Network and Information Security, 2016, 2(5): 77-80. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|