RMIT University
Browse

CTM-sp: A family of cryptographic hash functions from chaotic tent maps

conference contribution
posted on 2024-10-31, 20:04 authored by Xun YiXun Yi, Xuechao Yang, Yong Feng, Fengling HanFengling Han, Ron van Schyndel
Hash functions are commonly used in checksums, check digits, fingerprints, randomization functions, error-correcting codes, and ciphers. In this paper, we give a family of hash functions on the basis of chaotic tent maps and the sponge construction, where input is absorbed into the hash state at a given rate, then an output hash is squeezed from it at the same rate. The family include four types of hash functions, which are designed to facilitate the implementation on 8-bit, 16-bit, 32-bit and 64-bit processors, respectively. Our experiments have shown that the family meet security criteria for design of hash functions and the performance of our hash functions is comparable to SHA-3.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1007/978-3-319-40253-6_20
  2. 2.
    ISBN - Is published in 9783319402529 (urn:isbn:9783319402529)

Start page

329

End page

342

Total pages

14

Outlet

Proceedings of the 21st Australasian Conference - Information Security and Privacy (ACISP 2016)

Editors

Joseph K. Liu, Ron Steinfeld

Name of conference

ACISP 2016

Publisher

Springer

Place published

Switzerland

Start date

2016-07-04

End date

2016-07-06

Language

English

Copyright

© Springer International Publishing Switzerland 2016

Former Identifier

2006069099

Esploro creation date

2020-06-22

Fedora creation date

2016-12-20

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC