From Collatz Conjecture to chaos and hash function

<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash fu...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Masrat Rasool (17807813) (author)
مؤلفون آخرون: Samir Brahim Belhaouari (9427347) (author)
منشور في: 2023
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513530394312704
author Masrat Rasool (17807813)
author2 Samir Brahim Belhaouari (9427347)
author2_role author
author_facet Masrat Rasool (17807813)
Samir Brahim Belhaouari (9427347)
author_role author
dc.creator.none.fl_str_mv Masrat Rasool (17807813)
Samir Brahim Belhaouari (9427347)
dc.date.none.fl_str_mv 2023-11-01T00:00:00Z
dc.identifier.none.fl_str_mv 10.1016/j.chaos.2023.114103
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/From_Collatz_Conjecture_to_chaos_and_hash_function/25018409
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Chaotic map
Hash function
Security
Collatz Conjecture
dc.title.none.fl_str_mv From Collatz Conjecture to chaos and hash function
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. The Collatz Conjecture is a mystery that has stumped mathematicians for decades and still has not been solved. This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. By leveraging the unpredictable behaviour of the Collatz sequence, the proposed hash function aims to enhance ergodicity and entropy properties, thereby making it well-suited for cryptographic applications. In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. These sequences are then utilized within the diffusion and confusion structures of the hashing function. The design of the chaos-hash model is carefully optimized to exhibit desirable characteristics such as randomness, collision resistance, uniformity, sensitivity to initial conditions, speed, and resistance against cryptanalysis. The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. Through comprehensive evaluations conducted under various circumstances and with different datasets, the suggested hash function consistently outperforms the state-of-the-art alternatives. Experiments involving diverse input scenarios consistently demonstrate that the proposed hash function surpasses the performance of the current leading alternatives. Its superior performance is observed across various evaluation metrics, confirming its effectiveness in generating reliable and secure hash values. The results obtained from the comparative analysis highlight the superiority of the proposed hash function over existing alternatives, validating its potential as a robust solution for various cryptographic applications.</p><h2>Other Information</h2> <p> Published in: Chaos, Solitons & Fractals<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.chaos.2023.114103" target="_blank">https://dx.doi.org/10.1016/j.chaos.2023.114103</a></p>
eu_rights_str_mv openAccess
id Manara2_412dbfdba027a06534708d542c6d41ae
identifier_str_mv 10.1016/j.chaos.2023.114103
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/25018409
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling From Collatz Conjecture to chaos and hash functionMasrat Rasool (17807813)Samir Brahim Belhaouari (9427347)Information and computing sciencesCybersecurity and privacyMathematical sciencesApplied mathematicsChaotic mapHash functionSecurityCollatz Conjecture<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. The Collatz Conjecture is a mystery that has stumped mathematicians for decades and still has not been solved. This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. By leveraging the unpredictable behaviour of the Collatz sequence, the proposed hash function aims to enhance ergodicity and entropy properties, thereby making it well-suited for cryptographic applications. In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. These sequences are then utilized within the diffusion and confusion structures of the hashing function. The design of the chaos-hash model is carefully optimized to exhibit desirable characteristics such as randomness, collision resistance, uniformity, sensitivity to initial conditions, speed, and resistance against cryptanalysis. The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. Through comprehensive evaluations conducted under various circumstances and with different datasets, the suggested hash function consistently outperforms the state-of-the-art alternatives. Experiments involving diverse input scenarios consistently demonstrate that the proposed hash function surpasses the performance of the current leading alternatives. Its superior performance is observed across various evaluation metrics, confirming its effectiveness in generating reliable and secure hash values. The results obtained from the comparative analysis highlight the superiority of the proposed hash function over existing alternatives, validating its potential as a robust solution for various cryptographic applications.</p><h2>Other Information</h2> <p> Published in: Chaos, Solitons & Fractals<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.chaos.2023.114103" target="_blank">https://dx.doi.org/10.1016/j.chaos.2023.114103</a></p>2023-11-01T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1016/j.chaos.2023.114103https://figshare.com/articles/journal_contribution/From_Collatz_Conjecture_to_chaos_and_hash_function/25018409CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/250184092023-11-01T00:00:00Z
spellingShingle From Collatz Conjecture to chaos and hash function
Masrat Rasool (17807813)
Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Chaotic map
Hash function
Security
Collatz Conjecture
status_str publishedVersion
title From Collatz Conjecture to chaos and hash function
title_full From Collatz Conjecture to chaos and hash function
title_fullStr From Collatz Conjecture to chaos and hash function
title_full_unstemmed From Collatz Conjecture to chaos and hash function
title_short From Collatz Conjecture to chaos and hash function
title_sort From Collatz Conjecture to chaos and hash function
topic Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Chaotic map
Hash function
Security
Collatz Conjecture