A Robust Hash Function Using Cross-Coupled Chaotic Maps with Absolute-Valued Sinusoidal Nonlinearity
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
This paper presents a compact and effective chaos-based keyed hash function implemented by a cross-coupled topology of chaotic maps, which employs absolute-value of sinusoidal nonlinearity, and offers robust chaotic regions over broad parameter spaces with high degree of randomness through chaoticity measurements using the Lyapunov exponent. Hash function operations involve an initial stage when the chaotic map accepts initial conditions and a hashing stage that accepts input messages and generates the alterable-length hash values. Hashing performances are evaluated in terms of original message condition changes, statistical analyses, and collision analyses. The results of hashing performances show that the mean changed probabilities are very close to 50%, and the mean number of bit changes is also close to a half of hash value lengths. The collision tests reveal the mean absolute difference of each character values for the hash values of 128, 160 and 256 bits are close to the ideal value of 85.43. The proposed keyed hash function enhances the collision resistance, comparing to MD5 and SHA1, and the other complicated chaos-based approaches. An implementation of hash function Android application is demonstrated.
Authors and Affiliations
Wimol San-Um, Warakorn Srichavengsup
Solution of Electromagnetic and Velocity Fields for an Electrohydrodynamic Fluid Dynamical System
We studied the temporal evolution of the electromagnetic and velocity fields in an incompressible conducting fluid by means of computer simulations from the Navier Stokes and Maxwell’s equations. We then derived the se...
Web Application Development by Applying the MVC and Table Data Gateway in the Annual Program Budget Management System
This paper is the result of the development of the Web application to register the Annual Work Program, in which goals and actions are assigned the financial resources to manage the annual work program identified. In thi...
Information Processing in EventWeb through Detection and Analysis of Connections between Events
Information over the Web is rapidly becoming event-centric with the next age of WWW projected to be an EventWeb in which nodes are inter-connected through diverse types of links. These nodes represent events having infor...
A New Approach of Graph Realization for Data Hiding using Human Encoding
The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information....
Computer Students Attitudes on the Integration of m-Learning Applications
Technology has an important role in the lives particularly in the field of education nowadays because of its accessibility and affordability. Mobile learning (m-Learning) which is form of e-learning is a novel approach i...