Cryptanalysis of some chaos-based keyed hash functions

By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419915/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537787234353152
author ZHENG Shi-hui1
ZHANG Guo-yan3
YANG Yi-xian1
LI Zhong-xian1
author_facet ZHENG Shi-hui1
ZHANG Guo-yan3
YANG Yi-xian1
LI Zhong-xian1
author_sort ZHENG Shi-hui1
collection DOAJ
description By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally,an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks,while the increased workload could be neglected.
format Article
id doaj-art-583f60ef443b47d89dd9b70abc79ed7f
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-583f60ef443b47d89dd9b70abc79ed7f2025-01-14T08:23:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013214615274419915Cryptanalysis of some chaos-based keyed hash functionsZHENG Shi-hui1ZHANG Guo-yan3YANG Yi-xian1LI Zhong-xian1By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally,an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks,while the increased workload could be neglected.http://www.joconline.com.cn/zh/article/74419915/chaoskeyed hash functionforgerykey recovery
spellingShingle ZHENG Shi-hui1
ZHANG Guo-yan3
YANG Yi-xian1
LI Zhong-xian1
Cryptanalysis of some chaos-based keyed hash functions
Tongxin xuebao
chaos
keyed hash function
forgery
key recovery
title Cryptanalysis of some chaos-based keyed hash functions
title_full Cryptanalysis of some chaos-based keyed hash functions
title_fullStr Cryptanalysis of some chaos-based keyed hash functions
title_full_unstemmed Cryptanalysis of some chaos-based keyed hash functions
title_short Cryptanalysis of some chaos-based keyed hash functions
title_sort cryptanalysis of some chaos based keyed hash functions
topic chaos
keyed hash function
forgery
key recovery
url http://www.joconline.com.cn/zh/article/74419915/
work_keys_str_mv AT zhengshihui1 cryptanalysisofsomechaosbasedkeyedhashfunctions
AT zhangguoyan3 cryptanalysisofsomechaosbasedkeyedhashfunctions
AT yangyixian1 cryptanalysisofsomechaosbasedkeyedhashfunctions
AT lizhongxian1 cryptanalysisofsomechaosbasedkeyedhashfunctions