4.7 Article

Designing an authenticated Hash function with a 2D chaotic map

Journal

NONLINEAR DYNAMICS
Volume 104, Issue 4, Pages 4569-4580

Publisher

SPRINGER
DOI: 10.1007/s11071-021-06491-3

Keywords

2D chaotic map; Data integrity; Keyed hash; Stream cipher; Chaos-based cryptography

Ask authors/readers for more resources

This paper demonstrates the use of coefficient values of 2D chaotic map to generate pseudo-random number generators, and proves the randomness of the generated sequences through testing. The random sequences are utilized for encrypting images and detecting if they have been altered.
This paper shows the use of four sets of coefficient values of the 2D chaotic map to generate pseudo-random number generators. We demonstrate that the generated sequences are random by applying NIST suite 800-22-a and TestU01 tests. The generated random sequences are used to implement a stream cipher and are applied to encrypt images. To detect if the images have been modified, we propose to use the random sequences as keys for a hash function based on the pseudo-dot product. This hash can be used as a message authentication code in the images to detect if the stored information has been compromised. The proposed schemes can be used to encrypt and authenticate any digital data not only images. The random sequences generator is probed also in a high-performance microcontroller STM32F746ZG obtaining a throughput of 173.35 Kbit/s.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available