Please wait a minute...
Chin. Phys. B, 2008, Vol. 17(10): 3588-3595    DOI: 10.1088/1674-1056/17/10/010
GENERAL Prev   Next  

Constructing a one-way hash function based on the unified chaotic system

Long Min(龙敏)a)†, Peng Fei(彭飞)b), and Chen Guan-Rong(陈关荣)c)
a College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410076, China; b College of Computer and Communication, Hunan University, Changsha 410082, China; c Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China
Abstract  A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security.
Keywords:  Hash function      unified chaotic system      cryptography  
Received:  17 September 2007      Revised:  27 May 2008      Accepted manuscript online: 
PACS:  05.45.-a (Nonlinear dynamics and chaos)  
Fund: Project supported by the Natural Science Foundation of Hunan Province, China (Grant No 08JJ4020).

Cite this article: 

Long Min(龙敏), Peng Fei(彭飞), and Chen Guan-Rong(陈关荣) Constructing a one-way hash function based on the unified chaotic system 2008 Chin. Phys. B 17 3588

[1] Quantum private comparison of arbitrary single qubit states based on swap test
Xi Huang(黄曦), Yan Chang(昌燕), Wen Cheng(程稳), Min Hou(侯敏), and Shi-Bin Zhang(张仕斌). Chin. Phys. B, 2022, 31(4): 040303.
[2] New semi-quantum key agreement protocol based on high-dimensional single-particle states
Huan-Huan Li(李欢欢), Li-Hua Gong(龚黎华), and Nan-Run Zhou(周南润). Chin. Phys. B, 2020, 29(11): 110304.
[3] Coherent attacks on a practical quantum oblivious transfer protocol
Guang-Ping He(何广平). Chin. Phys. B, 2018, 27(10): 100308.
[4] Two-step quantum secure direct communication scheme with frequency coding
Xue-Liang Zhao(赵学亮), Jun-Lin Li(李俊林), Peng-Hao Niu(牛鹏皓), Hong-Yang Ma(马鸿洋), Dong Ruan(阮东). Chin. Phys. B, 2017, 26(3): 030302.
[5] Probabilistic direct counterfactual quantum communication
Sheng Zhang(张盛). Chin. Phys. B, 2017, 26(2): 020304.
[6] Anonymous voting for multi-dimensional CV quantum system
Rong-Hua Shi(施荣华), Yi Xiao(肖伊), Jin-Jing Shi(石金晶), Ying Guo(郭迎), Moon-Ho Lee. Chin. Phys. B, 2016, 25(6): 060301.
[7] Image encryption using random sequence generated from generalized information domain
Xia-Yan Zhang(张夏衍), Guo-Ji Zhang(张国基), Xuan Li(李璇), Ya-Zhou Ren(任亚洲), Jie-Hua Wu(伍杰华). Chin. Phys. B, 2016, 25(5): 054201.
[8] Controlled mutual quantum entity authentication using entanglement swapping
Min-Sung Kang, Chang-Ho Hong, Jino Heo, Jong-In Lim, Hyung-Jin Yang. Chin. Phys. B, 2015, 24(9): 090306.
[9] Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels
Huang Wei (黄伟), Wen Qiao-Yan (温巧燕), Liu Bin (刘斌), Gao Fei (高飞). Chin. Phys. B, 2015, 24(7): 070308.
[10] Steganalysis and improvement of a quantum steganography protocol via GHZ4 state
Xu Shu-Jiang (徐淑奖), Chen Xiu-Bo (陈秀波), Niu Xin-Xin (钮心忻), Yang Yi-Xian (杨义光). Chin. Phys. B, 2013, 22(6): 060307.
[11] Cryptanalysis and improvement of the controlled secure direct communication
Kao Shih-Hung, Hwang Tzonelih. Chin. Phys. B, 2013, 22(6): 060308.
[12] Hash function construction using weighted complex dynamical networks
Song Yu-Rong (宋玉蓉), Jiang Guo-Ping (蒋国平). Chin. Phys. B, 2013, 22(4): 040506.
[13] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
Zhang Sheng(张盛), Wang Jian(王剑), and Tang Chao-Jing(唐朝京) . Chin. Phys. B, 2012, 21(6): 060303.
[14] Cryptanalysis of fair quantum blind signatures
He Li-Bao(何立宝), Huang Liu-Sheng(黄刘生), Yang Wei(杨威), and Xu Rui(许瑞) . Chin. Phys. B, 2012, 21(3): 030306.
[15] Arbitrated quantum signature scheme based on entanglement swapping with signer anonymity
Li Wei (李伟), Fan Ming-Yu (范明钰), Wang Guang-Wei (王光卫). Chin. Phys. B, 2012, 21(12): 120305.
No Suggested Reading articles found!