Secure Hash Algorithm based on Efficient Chaotic Neural Network

@article{Abdoun2016SecureHA,
  title={Secure Hash Algorithm based on Efficient Chaotic Neural Network},
  author={Nabil Abdoun and Safwan El Assad and Mohammad Abu Taha and Rima Assaf and Olivier D{\'e}forges and Mohamad Khalil},
  journal={2016 International Conference on Communications (COMM)},
  year={2016},
  pages={405-410}
}
Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology based on Chaotic Neural Networks is used to design Hash functions due to the following important properties of Chaos and Neural Networks: non-linearity, compression, confusion and diffusion. Compared to existing Hash functions based on Chaotic Neural Networks, the proposed… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

A HYBRID TEXT – IMAGE SECURITY TECHNIQUE

VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Hash Hardware Generator Based on Mutual Perturbed Logistic Map

Yuling Luo, Shuming Han, Junxiu Liu, Zhewei Liang, Su Yang
  • 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
  • 2019

New keyed chaotic neural network hash function based on sponge construction

  • 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
  • 2017
VIEW 2 EXCERPTS
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 16 REFERENCES

180-2

S. H. Standard, P. FIPS
  • August, vol. 1, p. 72, 2002.
  • 2002
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

A method for designing hash function based on chaotic neural network

B. He, P. Lei, Q. Pu, Z. Liu
  • 2013.
  • 2013
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Chaos-based cryptosystems using dependent diffusion: An overview

  • 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
  • 2015

Hash function based on efficient Chaotic Neural Network

  • 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
  • 2015
VIEW 2 EXCERPTS

standard: Permutation-based hash and extendable-output functions

N. SHA
  • FIPS PUB, vol. 202, p. 2015, 3.
  • 2015
VIEW 2 EXCERPTS

Efficient multicore implementation of an advanced generator of discrete chaotic sequences

  • The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
  • 2014
VIEW 1 EXCERPT

Generator of chaotic sequences and corresponding generating system

S. El Assad, H. Noura
  • Jul. 15 2014, uS Patent 8,781,116.
  • 2014
VIEW 1 EXCERPT

Chaos Based Information Hiding and Security

  • 2012 International Conference for Internet Technology and Secured Transactions
  • 2012
VIEW 1 EXCERPT