Back to Search Start Over

The design of keyed hash function based on CNN-MD structure.

Authors :
Wang, Yu
Chen, Liquan
Wang, Xingyuan
Wu, Ge
Yu, Kunliang
Lu, Tianyu
Source :
Chaos, Solitons & Fractals. Nov2021, Vol. 152, pN.PAG-N.PAG. 1p.
Publication Year :
2021

Abstract

• We propose a new hash structure by combining MD5 and chaotic neural network, adding two different parameter step functions to the original MD5 system to increase the complexity of MD5 for Joux multiple collision attacks. • In the data padding, a new data padding method is designed to resist the length extension attack, Joux multiple collision attacks.by using chaotic sequences for placeholders. • The output of each network is both an intermediate link variable and an input parameter for the subsequent modules, the output result will change dramatically after being computed by multiple chaotic neural network modules. This ensures the sensitivity of the hash function, which in turn improves the stability of the system. In this paper, we propose a new chaotic neural network called the Merkle–Damgaard (CNN-MD) iterative structure, which we designed from the perspective of resisting attacks, such as length extension, second original image, Joux multiple collision, and intermediate encounter attacks. A new chaotic hash function based on the CNN-MD is presented. First, CNN is used as the compression function of CNN-MD, which ensures both the unidirectionality of data compression and the sensitivity of the hash value. Furthermore, the multi-input single-output construction of the CNN can achieve highly efficient data compression. In addition, in the process of group encryption of data, we use the value padding of coupled lattice mapping to improve the alignment of the plaintext of the MD algorithm. This new alignment can enhance the hash function's collision resistance and the CNN-MD sensitivity. Experimental and theoretical analyses show that our proposed hashing algorithm can resist attacks, such as second original image, brute force, and multiple collision attacks, better than MD5, SHA-1, and SHA-2 algorithms. In terms of speed, our proposed hashing algorithm can successfully handle existing commercial scenarios better than MD5, SHA-1, SHA-3, and other methods. Therefore, the hash algorithm proposed in this study can be applied to existing e-commerce scenarios. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09600779
Volume :
152
Database :
Academic Search Index
Journal :
Chaos, Solitons & Fractals
Publication Type :
Periodical
Accession number :
153372814
Full Text :
https://doi.org/10.1016/j.chaos.2021.111443