S. Idris, H. Zorkta, S. Khawatmi, and W. Aiyash (Syria)
Hash functions, Cryptography, Integrity, Digital Signature.
A new method for generating message authentication code with secret key HMAC is presented in this paper. 1 D chaotic system is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of collision hash MAC, and has high sensitivity to key-ciphertext, plaintext-ciphertext, and error propagation effects.
Important Links:
Go Back