Académique Documents
Professionnel Documents
Culture Documents
D ROSSLER SYSTEM-3
ABSTRACT
2. Rossler System
An enhanced keyed message authentication
code EHMAC is presented in this paper. 3-D
Rossler's system is probably the simplest 3-D ordinary
differential equations (ODEs) that have quadratic chaotic Rossler System is used to generate the initial
MASK, which is some kind of aliases used to achieve
nonlinearity and exhibits chaotic behavior [4,5]. Formally
they are given by the following set of three first order anonymity for the real sub-messages.
Analysis study proved that EHMAC is free of collision
coupled nonlinear ordinary differential equations:
hash MAC, and has high sensitivity to key-ciphertext,
plaintext-ciphertext, error propagation effects, and more
dx/dt = (y + z)- secure in comparison with its previous version.
dy/dt = x + ay
dz/dt = (b + z(x - c
KEYWORDS
Hash functions, Cryptography, Integrity, Digital
where a, b, and c are system parameters and x, y, z are the Signature.
state space variables of the Rossler system. Before these
system parameters are set to some specific values, we try
to locate the fixed points as a function of the system 1. Introduction
parameter. From the above set of equations, it follows that
In cryptography, a keyed-Hash Message
the location of the fixed points are given by z = -y = x/a
Authentication Code (HMAC or KHMAC), is a
and x is determined by solving the quadratic equation
type of message authentication code (MAC)
x2 - c*x + a*b = 0. Thus, x = (c ± sqrt(c*c - 4*a*b))/2 calculated using a specific algorithm involving a
and the solution exists if c>2*sqrt(a*b) and a is not equal cryptographic hash function in combination with
to zero. a secret key. As with any MAC, it may be used to
simultaneously verify both the data integrity and
In fig (1) the output from the simulation of Rossler the authenticity of a message [1]. The
system with a=0.2 b=0.2 and c=5.7 is provided. The cryptographic strength of the HMAC depends
series does not form limit cycles nor does it ever reach a upon the cryptographic strength of the
steady state. Instead it is an example of deterministic underlying hash function, on the size and quality
chaos. As with other chaotic systems the Rossler system of the key and the size of the hash output length
is sensitive to the initial conditions, two initial states no in bits [2].
matter how close will diverge, usually sooner rather than
later [6,7]. New proposal for 160 bits hash function
controlled by a key is introduced through this
article. Actually it is an enhancement for its
previous HMAC [3], Mask, Encryptor, and
compression parts of this new MAC are based on
the most famous 3-D Rossler System.
N bit plaintex t message
Padding N1 % Y = 0
For I = 1 to N1/Y
Ni ⊕ MASK = Xoi Y 0i Z 0i
Fig 3
(Fig.(1) Rossler System (a=0.2, b=0.2, c=5.7
Co1,C o2,…….,C ok
The chaotic behavior is further revealed by plotting the
bifurcation diagram at the Poincaré section (taken when
the phase variable x goes through a maxima) as a
.(function of c [8] (see fig 2
4.2. Plaintext-ciphertext avalanche effect The HMAC generating process (see Fig.(2)) can be done
Plaintext-ciphertext avalanche effect is concerned as follows:
with changing the plaintext and observing the effect of • N1 bits message is produced, after padding
this change on ciphertext. Table (4) illustrates the results process on the N bits plaintext message,
of plaintext-ciphertext avalanche effect with different • N1 bits message is divided into nK sub-message,
varying message lengths. each with Y bits length where
Through this analysis, the following initial values are Y = 160 bits
used: K = N1/Y
X0= 0.1111111111111111 Z0=0.9111111111111111 • For I = 1 to K Do
Y0= 0.2222222222222222 N=250 • Each sub-message ni is masked by XORing it
with the initial MASK.
EHMAC is very sensitive to any change in the message. • By using the same steps as in Fig.(3) we can
find the sub-MACs Coi
Table (4) explains this result through some examples for:
• Finally MAC = Co1 ⊕ Co2 ⊕ … ⊕ CoK
• 1 character change (first, last)
• 2, 3,4, 5 characters change (last) Generation of the MAC can be done in parallel with
• Case sensitive encryption process, and after that, MAC bits are added to
• Different message lengths the end of the ciphertext and sent to the receiver as a
whole encrypted message. On receiving, Y bits MAC is
4.3. Error propagation test taken, and the ciphertext is decrypted to obtain the
plaintext message. MAC is computed again and compared
with the received one. On equality, the receiver is
Error propagation is concerned with possibilities
confirmed that the received message has not been subject
of the propagation of errors from input (plaintext) to
to accidental or malicious corruption.
output (ciphertext) and about the effect of this error on the
ciphertext.
Table (5) explains some cases for error in the plaintext: 4. EHMAC Analysis
1) One character is changed in the first, middle,
and end of the message. Three types of analysis were done on the generated MAC:
2) More than one character is changed in 1- Key-ciphertext avalanche effect.
different places through the message. 2- Plaintext-ciphertext avalanche effect.
3- Error propagation effect.
From table (4), one can see that any change in the
plaintext (one character or more) will change the MAC,
which gives clear evidence about propagation of the 4.1. Key-ciphertext avalanche effect
errors.
5. EHMAC Time and Strength
Analysis
7. Conclusions
References
Fig (5) Hashing time vs. file size (N=250)
[1] http://en.wikipedia.org/wiki/HMAC
[2] J.Kim, A. Biryukov, B. Preneel, and S. Hong, On the
Security of HMAC and NMAC Based on HAVAL, MD4,
MD5, SHA-0, SHA-1, 2006.
[3] S. Idris, H. Zorkta, S. Khawatmi, and W. Aiyash, A
128 bits HMAC Based Upon Logistic Map, IASTED
MTN 2008.
[4] R. Gilmore&M.Lefrance, The topology of chaos,
Wiley, 2002.
[5] C. Letellier, E. Roulin & O. E. Rössler, Inequivalent
topologies of chaos in simple equations, Chaos, Solitons
& Fractals, 28, 337-360, 2006.
[6] http://www.scholarpedia.org/article/Rossler_attractor
[7] http://en.wikipedia.org/wiki/Rossler_map
[8] Nagata, K. Wayne. Nonlinear Dynamics and Chaos:
(Mathematics 345 Lecture Notes. Vancouver: University
of B.C., 2006).
Table(1) Key (X0)-ciphertext avalanche effect (where Y0=0.1,Z0=0.1,N=250)
X0 MAC in Hex. MASK in Hex.
0.1 0B634BE010D0B52483FF7787299ACA368A8D01A0 9FB1B9F9EE362A93C538DFC25C5A721F4D1E744B
0.11 BC1A024CDA3E3CF87284FE6F52FFC239598CBC68 5F7719E5F746BC0DF50980541BB1AB4D9252DDA0
0.111 402AB21C5935A0E4E555F1264728DA396AC5D8B9 B9F19B9E90EFB00A1725B1273E2D976B5D9728F1
0.1111 5B5E6E2A94C169CF8A523BE548209EC9F03A241C 581B19B581847866F58FFEFAC22D2F07F0D8338E
0.11111 C4ADFEEE766044E534496CC27BF4F30B713A06AF A04E4F5EE8139D20B59137FC6AAD24979928C532
0.111111 76DFF446059E39F892C17D56A6F4345C10F3B68A 246FE02246DD23BEB6B22AE92C3C838E0951AE07
0.1111111 B9C6A8A098C49F2F9E4B4CF166C3F3D1715D1026 449F01122BA2B11135915A6AADED2371A3FE66C3
0.11111111 0C8F0E22763190292509CF5D0B30BE28A2BBC678 504719B504403475B5915ABACEED236EF7DFC2D9
0.111111111 AA45C4501BC1A69199FC12A6BA684A9AF5624424 B5319B5043D5188A17AD8B9C36ED236EB3764C7E
0.1111111111 EEF2BEDDEEB24B46DBFAB712F8A604D0E279B37F DA5CE9EBDCDA5CE546B22B5873EC838B1143186B
0.11111111111 8F0EFE8831A6229D89815175CD79723FFB23BFD7 449F01122A620286B5915AC3B3ED236EABEFD1CB
0.111111111111 521E149377D8A29CDF03F855DB5074A6A49D5B41 B5319B5043CFF83617AD8BA51BED236EABDE4DB9
0.1111111111111 1BCED9F40510BBFF8529FADC73CBD359B0750FBD 449F01122A61FA6175915AC3B62D236EABDC8D9C
0.11111111111111 C38C2FE01D35BCB8F64C30645B74EE2C34D8BB79 05F01122A61FA50217AD8BA51E2D236EABDC6065
0.111111111111111 C3339E7063AA6098A5B0853BCC1B8E80ADAE9F35 B5319B5043CFF6E617AD8BA51E2D236EABDC5C89
0.1111111111111111 AD602D6329375A5A7B170F08EFA459D4AAA64548 821E6336A0879FEDCEB22B5876C4838B112FA2C0
0.11111111111111111 AD602D6329375A5A7B170F08EFA459D4AAA64548 821E6336A0879FEDCEB22B5876C4838B112FA2C0