Cargando…

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network

In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512 bits. The first structure is composed of two-...

Descripción completa

Detalles Bibliográficos
Autores principales: Abdoun, Nabil, El Assad, Safwan, Manh Hoang, Thang, Deforges, Olivier, Assaf, Rima, Khalil, Mohamad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597085/
https://www.ncbi.nlm.nih.gov/pubmed/33286780
http://dx.doi.org/10.3390/e22091012
_version_ 1783602257201201152
author Abdoun, Nabil
El Assad, Safwan
Manh Hoang, Thang
Deforges, Olivier
Assaf, Rima
Khalil, Mohamad
author_facet Abdoun, Nabil
El Assad, Safwan
Manh Hoang, Thang
Deforges, Olivier
Assaf, Rima
Khalil, Mohamad
author_sort Abdoun, Nabil
collection PubMed
description In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512 bits. The first structure is composed of two-layered CNN, while the second one is formed by one-layered CNN and a combination of nonlinear functions. Indeed, the proposed structures employ two strong nonlinear systems, precisely a chaotic system and a neural network system. In addition, the proposed study is a new methodology of combining chaotic neural networks and Sponge construction that is proved secure against known attacks. The performance of the two proposed structures is analyzed in terms of security and speed. For the security measures, the number of hits of the two proposed structures doesn’t exceed 2 for 256-bit hash values and does not exceed 3 for 512-bit hash values. In terms of speed, the average number of cycles to hash one data byte (NCpB) is equal to 50.30 for Structure 1, and 21.21 and 24.56 for Structure 2 with 8 and 24 rounds, respectively. In addition, the performance of the two proposed structures is compared with that of the standard hash functions SHA-3, SHA-2, and with other classical chaos-based hash functions in the literature. The results of cryptanalytic analysis and the statistical tests highlight the robustness of the proposed keyed hash functions. It also shows the suitability of the proposed hash functions for the application such as Message Authentication, Data Integrity, Digital Signature, and Authenticated Encryption with Associated Data.
format Online
Article
Text
id pubmed-7597085
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75970852020-11-09 Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network Abdoun, Nabil El Assad, Safwan Manh Hoang, Thang Deforges, Olivier Assaf, Rima Khalil, Mohamad Entropy (Basel) Article In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512 bits. The first structure is composed of two-layered CNN, while the second one is formed by one-layered CNN and a combination of nonlinear functions. Indeed, the proposed structures employ two strong nonlinear systems, precisely a chaotic system and a neural network system. In addition, the proposed study is a new methodology of combining chaotic neural networks and Sponge construction that is proved secure against known attacks. The performance of the two proposed structures is analyzed in terms of security and speed. For the security measures, the number of hits of the two proposed structures doesn’t exceed 2 for 256-bit hash values and does not exceed 3 for 512-bit hash values. In terms of speed, the average number of cycles to hash one data byte (NCpB) is equal to 50.30 for Structure 1, and 21.21 and 24.56 for Structure 2 with 8 and 24 rounds, respectively. In addition, the performance of the two proposed structures is compared with that of the standard hash functions SHA-3, SHA-2, and with other classical chaos-based hash functions in the literature. The results of cryptanalytic analysis and the statistical tests highlight the robustness of the proposed keyed hash functions. It also shows the suitability of the proposed hash functions for the application such as Message Authentication, Data Integrity, Digital Signature, and Authenticated Encryption with Associated Data. MDPI 2020-09-10 /pmc/articles/PMC7597085/ /pubmed/33286780 http://dx.doi.org/10.3390/e22091012 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Abdoun, Nabil
El Assad, Safwan
Manh Hoang, Thang
Deforges, Olivier
Assaf, Rima
Khalil, Mohamad
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title_full Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title_fullStr Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title_full_unstemmed Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title_short Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
title_sort designing two secure keyed hash functions based on sponge construction and the chaotic neural network
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597085/
https://www.ncbi.nlm.nih.gov/pubmed/33286780
http://dx.doi.org/10.3390/e22091012
work_keys_str_mv AT abdounnabil designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork
AT elassadsafwan designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork
AT manhhoangthang designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork
AT deforgesolivier designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork
AT assafrima designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork
AT khalilmohamad designingtwosecurekeyedhashfunctionsbasedonspongeconstructionandthechaoticneuralnetwork