Chaos-based hash function with both modification detection and localization capabilities
Document Type
Syllabus
Publication Date
1-1-2017
Abstract
As one of the cores of Cryptography, hashing is a basic technique for information security (Schneier, 1996; Stinson, 1995). A cryptographic hash function is used to compress the message data to a fixed-size hash value in such a way that any alternation to the data will generate a different hash value. Chaos is a kind of deterministic random-like process provided by nonlinear dynamic systems. Chaotic systems are systems that are random-like, but in fact are not random. They are governed by physical laws to make the accurate prediction almost impossible. It is a promising direction to utilize the characteristics of chaos to design hash function.
Identifier
85052574167 (Scopus)
ISBN
[9781439873311, 9781439873328]
Publication Title
Multimedia Security Watermarking Steganography and Forensics
External Full Text Location
https://doi.org/10.1201/b12697
First Page
313
Last Page
325
Recommended Citation
Xiao, Di; Shih, Frank Y.; and Liao, Xiaofeng, "Chaos-based hash function with both modification detection and localization capabilities" (2017). Faculty Publications. 9947.
https://digitalcommons.njit.edu/fac_pubs/9947
