Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419915/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537787234353152 |
---|---|
author | ZHENG Shi-hui1 ZHANG Guo-yan3 YANG Yi-xian1 LI Zhong-xian1 |
author_facet | ZHENG Shi-hui1 ZHANG Guo-yan3 YANG Yi-xian1 LI Zhong-xian1 |
author_sort | ZHENG Shi-hui1 |
collection | DOAJ |
description | By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally,an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks,while the increased workload could be neglected. |
format | Article |
id | doaj-art-583f60ef443b47d89dd9b70abc79ed7f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-583f60ef443b47d89dd9b70abc79ed7f2025-01-14T08:23:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013214615274419915Cryptanalysis of some chaos-based keyed hash functionsZHENG Shi-hui1ZHANG Guo-yan3YANG Yi-xian1LI Zhong-xian1By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and some suggestions for design keyed hash functions by using chaos systems were summarized.Finally,an improved scheme was presented.The scheme could resist the forging attacks and equivalent-key recovering attacks,while the increased workload could be neglected.http://www.joconline.com.cn/zh/article/74419915/chaoskeyed hash functionforgerykey recovery |
spellingShingle | ZHENG Shi-hui1 ZHANG Guo-yan3 YANG Yi-xian1 LI Zhong-xian1 Cryptanalysis of some chaos-based keyed hash functions Tongxin xuebao chaos keyed hash function forgery key recovery |
title | Cryptanalysis of some chaos-based keyed hash functions |
title_full | Cryptanalysis of some chaos-based keyed hash functions |
title_fullStr | Cryptanalysis of some chaos-based keyed hash functions |
title_full_unstemmed | Cryptanalysis of some chaos-based keyed hash functions |
title_short | Cryptanalysis of some chaos-based keyed hash functions |
title_sort | cryptanalysis of some chaos based keyed hash functions |
topic | chaos keyed hash function forgery key recovery |
url | http://www.joconline.com.cn/zh/article/74419915/ |
work_keys_str_mv | AT zhengshihui1 cryptanalysisofsomechaosbasedkeyedhashfunctions AT zhangguoyan3 cryptanalysisofsomechaosbasedkeyedhashfunctions AT yangyixian1 cryptanalysisofsomechaosbasedkeyedhashfunctions AT lizhongxian1 cryptanalysisofsomechaosbasedkeyedhashfunctions |