Robust chaotic key stream generator for real-time images encryption

被引:14
作者
Azzaz, M. S. [1 ]
Tanougast, C. [1 ]
Sadoudi, S. [1 ]
Dandache, A. [1 ]
机构
[1] Paul Verlaine Univ, Sensors Interfaces & Microelect Lab Metz, Metz, France
关键词
Encryption; Hardware chaotic generator; Image processing; FPGA; SCHEME; SYNCHRONIZATION; SECURITY; BREAKING;
D O I
10.1007/s11554-011-0219-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a robust and compact design architecture of hardware chaotic key generator for real-time images encryption. The new proposed approach combines the perturbation technique with a non-linear switching between multiple three-dimensional continuous chaotic systems. The originality of this new scheme is that it allows a low-cost image encryption for embedded systems while still providing a good trade-off between performance and hardware resources. This pipelined architecture is particularly attractive since it provides a high security. Numerical simulations and real-time experimental results using Xilinx FPGA Virtex technology have demonstrated the feasibility and the efficiency of our secure solution and can be applied to many secure real-time embedded applications in System on Chip (SoC). Thorough experimental tests are carried out with detailed analysis, demonstrating the high security and fast encryption speed of the new scheme while still able to resist statistical and key analysis attacks.
引用
收藏
页码:297 / 306
页数:10
相关论文
共 32 条
[11]  
Giesl J, 2009, INT J FUTUR GENER CO, V2, P23
[12]   Discrete-time chaotic encryption systems .1. Statistical design approach [J].
Gotz, M ;
Kelber, K ;
Schwarz, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 1997, 44 (10) :963-970
[13]   A CHAOTIC DIRECT-SEQUENCE SPREAD-SPECTRUM COMMUNICATION-SYSTEM [J].
HEIDARIBATENI, G ;
MCGILLEM, CD .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1994, 42 (2-4) :1524-1527
[14]   3 STEPS TO CHAOS .2. A CHUA CIRCUIT PRIMER [J].
KENNEDY, MP .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 1993, 40 (10) :657-674
[15]   Pseudorandom bits generated by chaotic maps [J].
Kocarev, L ;
Jakimoski, G .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2003, 50 (01) :123-126
[16]   Breaking a chaos-based secure communication scheme designed by an improved modulation method [J].
Li, SJ ;
Alvarez, G ;
Chen, GR .
CHAOS SOLITONS & FRACTALS, 2005, 25 (01) :109-120
[17]   On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision [J].
Li, SJ ;
Mou, XQ ;
Cai, YL ;
Ji, Z ;
Zhang, JH .
COMPUTER PHYSICS COMMUNICATIONS, 2003, 153 (01) :52-58
[18]   Improving security of a chaotic encryption approach [J].
Li, SJ ;
Mou, XQ ;
Cai, YL .
PHYSICS LETTERS A, 2001, 290 (3-4) :127-133
[19]   Digital chaotic sequence generator based on coupled chaotic systems [J].
Liu Shu-Bo ;
Sun Jing ;
Xu Zheng-Quan ;
Liu Jin-Shuo .
CHINESE PHYSICS B, 2009, 18 (12) :5219-5227
[20]   A novel fast image encryption scheme based on 3D chaotic baker maps [J].
Mao, YB ;
Chen, GR ;
Lian, SG .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2004, 14 (10) :3613-3624