Download PDFOpen PDF in browserA HMAC Scheme Based on 6D Hyper Chaotic Maps for Enhanced SecurityEasyChair Preprint 136475 pages•Date: June 12, 2024AbstractThe HMAC (Keyed-Hash Message Authentication Code) algorithm serves as a cornerstone of security widely employed to ensure data authentication and integrity within information systems and computer networks. Essentially straightforward, HMAC relies on hash functions utilizing a secret key. The cryptographic strength of HMAC derives from its adept utilization of efficient cryptographic characteristics like balancing and the avalanche effect. In our research, we introduce a fresh HMAC algorithm incorporating hyperchaotic systems to bolster its cryptographic attributes. Our 6D-HMAC showcases resilience against MAC collision threats, displays heightened sensitivity to key, plaintext, and error propagation influences, and presents enhanced security in contrast to traditional approaches. Keyphrases: 6D Dimensions Maps, MAC, Message Authentication Code, hash functions, hyperchaotic system
|