[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques

Published: 01 June 2018 Publication History

Abstract

In this paper, we design and implement two new stream ciphers based on Pseudo Chaotic Number Generators (PCNGs) which integrate discrete chaotic maps, namely, Piecewise Linear Chaotic Map (PWLCM), Skewtent and Logistic map. They are weakly coupled by a predefined matrix A for the first PCNG and they are coupled by a binary diffusion matrix D for the second one. Each PCNG includes a chaotic multiplexing technique that allows the enhancement of the robustness of the system. The structure is implemented with finite precision N = 32 bits in C language. Security performance of the proposed stream ciphers is analysed and several cryptanalytic and statistical tests are applied. Experimental results highlight robustness as well as efficiency in terms of computation time of these two stream ciphers.

References

[1]
Ahmed HEdH, Kalash HM, Allah OSF (2007) An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica 31(1)
[2]
Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101---111
[3]
Amato P, Mascolo D, Pedaci I, Ruggiero D (2006) Method of generating successions of pseudo-random bits or numbers. US Patent App 11/381:474
[4]
Arlicot A (2014) Sequences generator based on chaotic maps. Tech rep IETR, Rennes, France
[5]
Barkan E, Biham E, Keller N (2003) Instant ciphertext-only cryptanalysis of gsm encrypted communication. In: Advances in cryptology-CRYPTO 2003. Springer, pp 600---616
[6]
Bougouin M (2015) Time performance analysis of estream stream ciphers. Tech rep, IETR-Polytech Nantes, France
[7]
Chai X, Yang K, Gan Z (2016) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools and Applications 1---21
[8]
Ekdahl P, Johansson T (2000) Snow-a new stream cipher. In: Proceedings of first open NESSIE workshop, KU-Leuven, pp 167---168
[9]
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144---157
[10]
Elaine B, John K (2012) Recommendation for random number generation using deterministic random bit generators. Tech rep, NIST SP 800-90 rev a
[11]
Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifurcation and Chaos 26(02):1650,021-1---1650,021-21
[12]
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753---4769
[13]
Jallouli O, Abutaha M, El Assad S, Chetto M, Queudet A, Deforges O (2016) Comparative study of two pseudo chaotic number generators for securing the iot. In: 2016 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1340---1344
[14]
Klein A (2008) Attacks on the rc4 stream cipher. Des Codes Crypt 48(3):269---286
[15]
Klein A (2013) Introduction to stream ciphers. In: Stream ciphers. Springer, pp 1---13
[16]
Kocarev L, Lian S (2011) Chaos-based cryptography. Springer
[17]
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320---3327
[18]
Lozi R (2007) New enhanced chaotic number generators. Indian Journal of Industrial and Applied Mathematics 1(1):1---23
[19]
Lozi R (2012) Emergence of randomness from chaos. International Journal of Bifurcation and Chaos 22(02):1250,021-1---1250,021-15
[20]
Maleki F, Mohades A, Hashemi SM, Shiri ME (2008) An image encryption system by cellular automata with memory. In: Third international conference on availability, reliability and security, 2008. ARES 08. IEEE, pp 1266---1271
[21]
Manifavas C, Hatzivasilis G, Fysarakis K, Papaefstathiou Y (2015) A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks
[22]
Matthews R (1989) On the derivation of a "chaotic" encryption algorithm. Cryptologia 13(1):29---42
[23]
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926---934
[24]
Petersen MV, SØrensen HMB (2007) Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data, US Patent 7,170,997
[25]
Robshaw M (2008) The estream project. In: New stream cipher designs. Springer, pp 1---6
[26]
Rogaway P, Coppersmith D (1998) A software-optimized encryption algorithm. J Cryptol 11(4):273---287
[27]
Rukhin AL, Soto J, Nechvatal JR, Smid M, Barker EB, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2008) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., NIST SP 800-22 Rev 1
[28]
Stallings W (2014) Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed
[29]
Tang Y, Wang Z, Ja Fang (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456---2468
[30]
Taralova I, Lozi R, El Assad S (2012) Chaotic generator synthesis: dynamical and statistical analysis. In: 2012 international conference for internet technology and secured transactions. IEEE, pp 56---59
[31]
Vidal G, Baptista MS, Mancini H (2014) A fast and light stream cipher for smartphones. The European Physical Journal Special Topics 223(8):1601---1610
[32]
Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83(4):2373---2391
[33]
Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645---2652
[34]
Wu Y, Noonan JP, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Cyber Journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), pp 31---38
[35]
Zhang W, Wong Kw, Yu H, Zhu Zl (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066---2080
[36]
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902---913

Cited By

View all
  • (2022)Counteracting the dynamic degradation of high-dimensional digital chaotic systems via a stochastic jump mechanismDigital Signal Processing10.1016/j.dsp.2022.103651129:COnline publication date: 1-Sep-2022
  • (2022)Delay-Dependent Stability Analysis of Interfered Digital Filters with Time-Varying Delay and Saturation NonlinearitiesCircuits, Systems, and Signal Processing10.1007/s00034-022-02052-041:10(5765-5784)Online publication date: 1-Oct-2022
  • (2021)Novel pseudo random key & cosine transformed chaotic maps based satellite image encryptionMultimedia Tools and Applications10.1007/s11042-021-10970-580:18(27785-27805)Online publication date: 1-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 77, Issue 11
June 2018
1406 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 June 2018

Author Tags

  1. Chaos-based cryptography
  2. Coupling and multiplexing techniques
  3. Discrete chaotic maps
  4. Pseudo-chaotic number generator
  5. Stream cipher

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Counteracting the dynamic degradation of high-dimensional digital chaotic systems via a stochastic jump mechanismDigital Signal Processing10.1016/j.dsp.2022.103651129:COnline publication date: 1-Sep-2022
  • (2022)Delay-Dependent Stability Analysis of Interfered Digital Filters with Time-Varying Delay and Saturation NonlinearitiesCircuits, Systems, and Signal Processing10.1007/s00034-022-02052-041:10(5765-5784)Online publication date: 1-Oct-2022
  • (2021)Novel pseudo random key & cosine transformed chaotic maps based satellite image encryptionMultimedia Tools and Applications10.1007/s11042-021-10970-580:18(27785-27805)Online publication date: 1-Jul-2021
  • (2020)Implementation and practical problems of chaos-based cryptography revisitedJournal of Information Security and Applications10.1016/j.jisa.2019.10242150:COnline publication date: 1-Feb-2020

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media