Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure
Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can only generate a single hash value of fixed lengt...
Saved in:
| Published in | Scientific reports Vol. 15; no. 1; pp. 5462 - 20 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
London
Nature Publishing Group UK
14.02.2025
Nature Publishing Group Nature Portfolio |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2045-2322 2045-2322 |
| DOI | 10.1038/s41598-025-88764-0 |
Cover
| Summary: | Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can only generate a single hash value of fixed length, thus lacking flexibility. To overcome the above problems, a novel hash function based on a 2D linear cross-coupled hyperchaotic map (HF-2DLCHM) is introduced and has a parallel feedback structure. Compared to the typical 1D chaotic maps, 2DLCHM has superior dynamic complexity, allowing HF-2DLCHM to resist phase space reconstruction attacks. A parallelizable structure is introduced, enhancing computational efficiency through concurrent processing of operational units. Simultaneously, the feedback mechanism is incorporated to augment the diffusion effect, ensuring better mixing and distribution of information. Moreover, by controlling the size of the input parameter
T
, the scheme can generate a hash value of
bits. The experimental results illustrate that this scheme exhibits distribution, confusion, diffusion and collision resistance characteristics approaching their nearly ideal benchmarks while maintaining an acceptable speed. Therefore, this scheme holds substantial practical potential in the domain of data security and privacy protection. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ISSN: | 2045-2322 2045-2322 |
| DOI: | 10.1038/s41598-025-88764-0 |