Chaos-based hash function with both modification detection and localization capabilities

Di Xiao, Frank Y. Shih, Xiaofeng Liao

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

As one of the cores of Cryptography, hashing is a basic technique for information security (Schneier, 1996; Stinson, 1995). A cryptographic hash function is used to compress the message data to a fixed-size hash value in such a way that any alternation to the data will generate a different hash value. Chaos is a kind of deterministic random-like process provided by nonlinear dynamic systems. Chaotic systems are systems that are random-like, but in fact are not random. They are governed by physical laws to make the accurate prediction almost impossible. It is a promising direction to utilize the characteristics of chaos to design hash function.

Original languageEnglish (US)
Title of host publicationMultimedia Security
Subtitle of host publicationWatermarking, Steganography, and Forensics
PublisherCRC Press
Pages313-325
Number of pages13
ISBN (Electronic)9781439873328
ISBN (Print)9781439873311
DOIs
StatePublished - Jan 1 2017

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Engineering(all)

Fingerprint Dive into the research topics of 'Chaos-based hash function with both modification detection and localization capabilities'. Together they form a unique fingerprint.

Cite this