Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers

被引:11
作者
Dridi, Fethi [1 ,2 ]
El Assad, Safwan [2 ]
Youssef, Wajih El Hadj [1 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab E E, Monastir 5019, Tunisia
[2] Univ Nantes, IETR UMR 6164, CNRS, F-44000 Nantes, France
关键词
chaos-based stream ciphers; PRNGs-CS; FPGA; security analysis; hardware metrics; CRYPTOGRAPHY;
D O I
10.3390/fractalfract7020197
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map models, such as the Logistic, Skew-Tent, PWLCM, 3D-Chebyshev map, and 32-bit LFSR, which are the main components of the proposed chaotic generators. Based on the performance analysis collected from the discrete chaotic maps, we then designed, implemented, and analyzed the performance of three proposed robust pseudo-random number generators of chaotic sequences (PRNGs-CS) and their corresponding stream ciphers. The proposed PRNGs-CS are based on the predefined coupling matrix M. The latter achieves a weak mixing of the chaotic maps and a chaotic multiplexing technique or XOR operator for the output function. Therefore, the randomness of the sequences generated is expanded as well as their lengths, and divide-and-conquer attacks on chaotic systems are avoided. In addition, the proposed PRNGs-CS contain polynomial mappings of at least degree 2 or 3 to make algebraic attacks very difficult. Various experimental results obtained and analysis of performance in opposition to different kinds of numerical and cryptographic attacks determine the high level of security and good hardware metrics achieved by the proposed chaos system. The proposed system outperformed the state-of-the-art works in terms of high-security level and a high throughput which can be considered an alternative to the standard methods.
引用
收藏
页数:26
相关论文
共 46 条
  • [1] Encryption for multimedia based on chaotic map: Several scenarios
    Abdelfatah, Roayat Ismail
    Nasr, Mohamed E.
    Alsharqawy, Mohammed A.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 19717 - 19738
  • [2] Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
    Abdoun, Nabil
    El Assad, Safwan
    Thang Manh Hoang
    Deforges, Olivier
    Assaf, Rima
    Khalil, Mohamad
    [J]. ENTROPY, 2020, 22 (09)
  • [3] A Chaotic Secure Communication System Design Based on Iterative Learning Control Theory
    Acho, Leonardo
    [J]. APPLIED SCIENCES-BASEL, 2016, 6 (10):
  • [4] Alippi C, 2014, INT SYMP INTEGR CIRC, P144, DOI 10.1109/ISICIR.2014.7029580
  • [5] AlMashrafi M.J., 2011, P 4 INT C SECURITY I, P191, DOI [10.1145/2070425.2070455, DOI 10.1145/2070425.2070455]
  • [6] [Anonymous], 2011, ETSI SAGE SPEC 3GPP
  • [7] [Anonymous], 2007, Applied cryptography: protocols, algorithms, and source code in C
  • [8] Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
    Battikh, Dalia
    El Assad, Safwan
    Thang Manh Hoang
    Bakhache, Bassem
    Deforges, Olivier
    Khalil, Mohamad
    [J]. ENTROPY, 2019, 21 (08)
  • [9] A novel image encryption scheme based on substitution-permutation network and chaos
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    [J]. SIGNAL PROCESSING, 2016, 128 : 155 - 170
  • [10] Bulens P., 2007, P STATE ART STREAM C, VVolume 24, P2007