{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T14:53:49Z","timestamp":1678200829096},"reference-count":11,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"

Recently, a parallel hash function based on chaotic maps with changeable parameters was proposed by Li et al (2011, pp.1305-1312). In this paper, the security of it is analyzed and the weakness of the architecture is pointed out. It is found that the main limitations are the error using of floor, round and exclusive OR operations in the algorithm. In order to counterstrike these, some improvements are done to strength its security. Theoretical analysis and experimental results illustrate that the improved Hash function is more secure and practical than the original one.<\/p>","DOI":"10.4018\/jdcf.2013040102","type":"journal-article","created":{"date-parts":[[2013,9,3]],"date-time":"2013-09-03T16:09:07Z","timestamp":1378224547000},"page":"23-34","source":"Crossref","is-referenced-by-count":2,"title":["Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters"],"prefix":"10.4018","volume":"5","author":[{"given":"Min","family":"Long","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]}],"member":"2432","reference":[{"key":"jdcf.2013040102-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.02.044"},{"key":"jdcf.2013040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2009.07.016"},{"key":"jdcf.2013040102-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.04.021"},{"key":"jdcf.2013040102-3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0543-4"},{"key":"jdcf.2013040102-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.168"},{"issue":"5","key":"jdcf.2013040102-5","doi-asserted-by":"crossref","first-page":"2737","DOI":"10.7498\/aps.57.2737","article-title":"The collision of one keyed hash function based on chaotic map and analysis.","volume":"57","author":"J.Wang","year":"2008","journal-title":"Acta Physica Sinica"},{"key":"jdcf.2013040102-6","unstructured":"Wang, J., Xu, S., & Tian, M. (2010). The analysis for a chaos-based one-way hash algorithm. In Proceedings of the 2010 International Conference on Electrical and Control Engineering (pp. 25-27)."},{"key":"jdcf.2013040102-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.06.017"},{"key":"jdcf.2013040102-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.05.011"},{"key":"jdcf.2013040102-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.04.060"},{"key":"jdcf.2013040102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.10.052"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=83487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:23:38Z","timestamp":1654133018000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2013040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2013040102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}