ComputationWorld 2018
February 18 - 22, 2018 - Barcelona, Spain

  • SERVICE COMPUTATION 2018, The Tenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2018, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2018, The Tenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2018, The Tenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2018, The Tenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2018, The Tenth International Conference on Creative Content Technologies
  • PATTERNS 2018, The Tenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2018, The Ninth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2018, The Eighth International Conference on Business Intelligence and Technology

DigitalWorld 2018
March 25 - 29, 2018 - Rome, Italy

  • ICDS 2018, The Twelfth International Conference on Digital Society and eGovernments
  • ACHI 2018, The Eleventh International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2018, The Tenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2018, The Tenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2018, The Tenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2018, The Tenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2018, The Third International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2018, The Third International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2018
April 22 - 26, 2018 - Athens, Greece

  • ICDT 2018, The Thirteenth International Conference on Digital Telecommunications
  • SPACOMM 2018, The Tenth International Conference on Advances in Satellite and Space Communications
  • ICN 2018, The Seventeenth International Conference on Networks
    • SOFTNETWORKING 2018, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
  • ICONS 2018, The Thirteenth International Conference on Systems
  • MMEDIA 2018, The Tenth International Conference on Advances in Multimedia
  • PESARO 2018, The Eighth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2018, The Eleventh International Conference on Communication Theory, Reliability, and Quality of Service
  • COCORA 2018, The Eighth International Conference on Advances in Cognitive Radio
  • ALLDATA 2018, The Fourth International Conference on Big Data, Small Data, Linked Data and Open Data
    • KESA 2018, The International Workshop on Knowledge Extraction and Semantic Annotation
  • SOFTENG 2018, The Fourth International Conference on Advances and Trends in Software Engineering

InfoSys 2018
May 20 - 24, 2018 - Nice, France

  • ICNS 2018, The Fourteenth International Conference on Networking and Services
  • ICAS 2018, The Fourteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2018, The Eighth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2018, The Sixth International Conference on Building and Exploring Web Based Environments
  • DBKDA 2018, The Tenth International Conference on Advances in Databases, Knowledge, and Data Applications
    • GraphSM 2018, The Fifth International Workshop on Large-scale Graph Analysis, Management and Applications
  • SIGNAL 2018, The Third International Conference on Advances in Signal, Image and Video Processing

BioSciencesWorld 2018
May 20 - 24, 2018 - Nice, France

  • BIOTECHNO 2018, The Tenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
  • BIONATURE 2018, The Ninth International Conference on Bioenvironment, Biodiversity and Renewable Energies

DataSys 2018
July 22 - 26, 2018- Barcelona, Spain

  • AICT 2018, The Fourteenth Advanced International Conference on Telecommunications
  • ICIW 2018, The Thirteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2018, The Thirteenth International Conference on Internet Monitoring and Protection
  • SMART 2018, The Seventh International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2018, The Eighth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2018, The Eighth International Conference on Advanced Communications and Computation
    • MODOPT 2018, The International Symposium on Modeling and Optimization
  • MOBILITY 2018, The Eighth International Conference on Mobile Services, Resources, and Users
  • SPWID 2018, The Fourth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2018, The Third International Conference on Advances in Computation, Communications and Services

(to be completed)

 


ThinkMind // International Journal On Advances in Internet Technology, volume 5, numbers 1 and 2, 2012 // View article inttech_v5_n12_2012_3


Quality Analysis of a Chaotic Proven Keyed Hash Function

Authors:
Jacques M. Bahi
Jean-François Couchot
Christophe Guyeux

Keywords: Keyed Hash Function; Internet Security; Mathematical Theory of Chaos; Topology

Abstract:
Hash functions are cryptographic tools, which are notably involved in integrity checking and password storage. They are of primary importance to improve the security of exchanges through the Internet. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital data must be investigated. In this document an original keyed hash function is evaluated. It is based on asynchronous iterations leading to functions that have been proven to be chaotic. It thus possesses various topological properties as uniformity and sensibility to its initial condition. These properties make our hash function satisfies established security requirements in this field. This claim is qualitatively proven and experimentally verified in this research work, among other things by realizing a large number of simulations.

Pages: 26 to 33

Copyright: Copyright (c) to authors, 2012. Used with permission.

Publication date: June 30, 2012

Published in: journal

ISSN: 1942-2652

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.