Font Size: a A A

The Research On Chaotic Message Authentication Code

Posted on:2015-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:H J LiFull Text:PDF
GTID:2308330461996680Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The information age, particularly the fast development of global Internet makes the dissemination and application of digital information become unprecedently important. Making sure that digital information is safe and effective during communicating period has been a hot topic of secure communication research. Message authentication code, as a basic algorithm to ensure data integrity, is widely used in finance, business system and all kinds of secure systems. It is also an effective barrier to guarantee that digital information could transfer safely in the communication channel. A good performance and a bright prospect shown by chaotic encryption provide favorable conditions for designing message authentication code algorithm. Hence, applying excellent characteristics of chaotic phenomenon into designing message authentication code is another important research direction in the chaotic cryptography.This paper focused on design and analysis of message authentication code, as well as research on the core of message authentication code--- chaotic hash function designing. In addition, combining theoretic with experiments and making a detailed analysis regarding experimental data and security performance were other important parts.First of all, the forging attack toward some fixed defects of HMAC (Hashed Message Authentication Code) algorithm was described. In addition, a novel improved scheme based on classical chaotic maps was proposed, which could generate HMAC parameter values through chaotic iteration. The scheme ensured to generate dynamic parameters for the HMAC algorithm as the chaotic system is sensitive to the initial variable and unpredictable to final values. Therefore, it effectively resisted the forging attacks as a result of enhancing security performance for HMAC algorithm. Simulation experiments were carried out to verify the statistic property and anti-collision performance of the scheme. Simulation results indicated that the program can dynamically generate HMAC algorithm parameters, and effectively resist against the forgery attack caused by drawbacks of fixed parameters.In addition, according to the core of message authentication code, a novel hash function based on spatiotemporal chaos maps was proposed. This approach was a turbulent system both imposed by m sequences and coupled modes. Selecting a few iteration values iterated by Chebyshev map as initial values for the coupled tent map based spatiotemporal chaotic pattern, ideal diffusion and confusion properties were achieved. Meanwhile, a m-sequence was added after spatiotemporal chaotic map iteration in order to resist the existing forge attacks. Computer simulation results showed that the novel approach can not only satisfy all performance requirements of hash function, but also can resist different kinds of attacks based on keyed hash functions. This novel hash function also improved security performance and can be able to effectively integrate other network technologies such as message authentication into use.
Keywords/Search Tags:Message authentication code, Chaotic map, HMAC, Hash function
PDF Full Text Request
Related items