Securing information using a proposed reliable chaos-based stream cipher: with real-time FPGA-based wireless connection implementation

被引:9
作者
Lahcene, Merah [1 ]
Noureddine, Chaib [2 ]
Lorenz, Pascal [3 ]
Adda, Ali-Pacha [4 ]
机构
[1] Univ Laghouat, Dept Elect, Fac Technol, Laghouat 03000, Algeria
[2] Univ Laghouat, Comp Sci & Math Lab, Laghouat 03000, Algeria
[3] Univ Haute Alsace IUT, F-68008 Colmar, France
[4] Univ Sci & Technol Oran, Coding & Informat Secur Lab, Oran 31000, Algeria
关键词
Chaos; Cryptography; Telecommunication; FPGA; Real-time; Channel noise; Dynamical degradation; Synchronization; APPROXIMATE ENTROPY; DIGITAL SIGNALS; CIRCUIT-DESIGN; COMMUNICATION; SYSTEMS; SCHEME; SYNCHRONIZATION; EFFICIENT; BREAKING; REALIZATION;
D O I
10.1007/s11071-022-07824-6
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, a robust chaos-based stream cipher (CBSC) is proposed. The novelty of this work is that it addresses all challenges confronting chaos-based cryptography. The PCBSC (proposed CBSC) has a robust synchronization circuit that mitigates the effect of channel noise, a perturbation block that overcomes the dynamical degradation, a robust encryption scheme, and an efficient control parameters' generator that generates strong keys. According to the complexity evaluation, the improved chaotic map provides good statistical properties. This can be confirmed by the obtained high values of the statistical metrics (largest Lyapunov exponent, approximate entropy, permutation entropy, and sample entropy) used for the evaluation. According to the security analysis, the PCBSC has good security features and provides strong keys that ensure confusion property, as well as enough space to withstand brute-force attacks. On the other hand, the proposed encryption scheme proves its efficiency; the result of the differential attack clearly shows that the diffusion property is guaranteed. Additionally, the original images' statistical properties are completely dispersed on the encrypted images. The obtained performance over noisy channels proves the synchronization circuit's efficiency. When compared to other proposals, the PCBSC provides the best results. In addition, the PCBSC is implemented on an FPGA and evaluated in real-time over a wireless link.
引用
收藏
页码:801 / 830
页数:30
相关论文
共 69 条
[1]  
Abu Taha Mohammed, 2017, International Journal of Internet Technology and Secured Transactions, V7, P89, DOI 10.1504/ijitst.2017.087131
[2]   A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps [J].
Ahmad M. ;
Khurana S. ;
Singh S. ;
AlSharari H.D. .
3D Research, 2017, 8 (02)
[3]   Digital Cosine Chaotic Map for Cryptographic Applications [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Teh, Je Sen ;
Alshoura, Wafa Hamdan .
IEEE ACCESS, 2019, 7 :150609-150622
[4]   Breaking two secure communication systems based on chaotic masking [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2004, 51 (10) :505-506
[5]   Breaking network security based on synchronized chaos [J].
Alvarez, G ;
Li, SJ .
COMPUTER COMMUNICATIONS, 2004, 27 (16) :1679-1681
[6]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[7]  
Andrew L.R., SP80022 NIST
[8]  
[Anonymous], 2007, EE Times
[9]   Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application [J].
Ayubi, Peyman ;
Setayeshi, Saeed ;
Rahmani, Amir Masoud .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[10]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2