Cryptanalysis of some chaos-based keyed hash functions

By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419915/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally,an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks,while the increased workload could be neglected.
ISSN:1000-436X