Parallel HAIFA Hashing Algorithm Based on Lorenz Chaos
DOI: 10.23977/acss.2021.050116 | Downloads: 13 | Views: 946
Author(s)
Yuanyi Liu 1, Xin Zhou 2, Ge Liu 2
Affiliation(s)
1 School of Electronic and Electrical Engineering, Lingnan Normal University, Zhanjiang 524048, China
2 School of Electronic and Information Engineering, Heilongjiang University of Science and Technology, Harbin 150022, China
Corresponding Author
Yuanyi LiuABSTRACT
Aiming at the inefficiency under parallel environment or large data computation, HAIFA hash function based on Lorenz chaos is constructed in parallel, and a parallel hash function based on Lorenz chaos is proposed. The algorithm compresses each message block independently and can be executed concurrently. After the hash value of each message block is obtained, every two hash values are combined. The odd-numbered rounds are combined with modular addition and right loop operation, while the even-numbered rounds are combined with XOR and left loop operation. The difference of each round of operation further enhances the anti-collision and anti-forgery attacks of the algorithm. The new parallel algorithm is tested for safety analysis and efficiency. The results show that the parallel modified algorithm has good performance and high efficiency, which has certain reference significance for the safety construction of parallel chaotic hash algorithm.
KEYWORDS
hash function, Lorenz chaotic system, Parallel structure, HAIFA iterative structureCITE THIS PAPER
Yuanyi Liu, Xin Zhou, Ge Liu. Parallel HAIFA Hashing Algorithm Based on Lorenz Chaos. Advances in Computer, Signals and Systems (2021) 5: 98-106. DOI: http://dx.doi.org/10.23977/acss.2021.050116.
REFERENCES
[1] Wang, S.W. (2015) on information safety, network safety and cyberspace safety. Journal of Library Science in China, 41(2): 72-84.
[2] Wang, Y., Chen, Y., Zhao, Y. (2018) Parallel Hash Function Construction Algorithm Based on Piecewise Logistic Mapping. Computer Engineering and Applications, 54(15): 38-43.
[3] Li, H.J., Long, M. Construction of one-way hash function with spatio-temporal chaos and double disturbances. Journal of Chinese Computer Systems, 36(3): 539-543.
[4] Feng, Y.R., Li, Y.T., Xiao, D. (2011) Construction and performance analysis of chaotic hash function based on parallel and variable parameters. Computer Applied Research, 28(11): 4307-4310.
[5] Li, Y., Li, X. (2016) Chaotic hash function based on circular shifts with variable parameters. Chaos Solitons & Fractals the Interdisciplinary Journal of Nonlinear Science & Nonequilibrium & Complex Phenomena, 2016, 91: 639 - 648.
[6] Albertini, A., Aumasson, J.P., Eichlseder, M., et al. (2014) Malicious hashing: eve’s variant of SHA-1 //International Conference on Selected Areas in Cryptography. Springer, Cham, 1 - 19.
[7] Wang, Y., Wong, K.W., Xiao, D. (2011) Parallel hash function construction based on coupled map lattices. Communications in Nonlinear Science and Numerical Simulation, 16(7): 2810 - 2821.
[8] Lv, A.P., he, Y. (2011) parallel hash function based on chaotic neural network. Modern Science & Technology of Telecommunications, 41(3): 38-41.
[9] Zhou, H., Wang, S. (2012) Collision analysis of a parallel keyed hash function based on chaotic neural network. Neurocomputing, 97: 108-114.
[10] Cui, H.S., Tian, Y., Deng, S.J. (2016) Improved parallel chaotic Hash function using bi-directional coupled map lattice. Computer Engineering and Applications, 52(4): 88-93.
[11] Zhao, G., Xu, G., Min, L.Q. (2011) Construction of a parallel spatiotemporal chaotic one-way Hash function. Microcomputer Information, 27(5): 232-235.
Downloads: | 12562 |
---|---|
Visits: | 251791 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks