Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction

被引:4
作者
Abdoun, Nabil [1 ]
El Assad, Safwan [2 ]
Manh Hoang, Thang [3 ]
Deforges, Olivier [4 ]
Assaf, Rima [5 ]
Khalil, Mohamad [5 ]
机构
[1] SysDICE GmbH, Res & Dev Dept, D-68259 Mannheim, Germany
[2] CNRS, UMR 6164, Polytech Nantes, Inst Elect & Technol Numer, F-35042 Nantes, France
[3] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Vietnam Japan Int Inst Sci Technol, 1 Dai Co Viet, Hanoi 10999, Vietnam
[4] CNRS, UMR 6164, Inst Elect & Technol Numer, F-35708 Rennes, France
[5] Lebanese Univ, Fac Engn, Beirut 90656, Lebanon
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 12期
关键词
authenticated encryption; duplex construction; chaotic neural network; statistical tests; security analysis; computing performance;
D O I
10.3390/sym13122432
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) based on our chaotic neural network revised (CNNR). Unlike the standard duplex construction (SDC), in the MDC there are two phases: the initialization phase and the duplexing phase, each contain a CNNR formed by a neural network with single layer, and followed by a set of non-linear functions. The MDC is implemented with two variants of width, i.e., 512 and 1024 bits. We tested our proposed scheme against the different cryptanalytic attacks. In fact, we evaluated the key and the message sensitivity, the collision resistance analysis and the diffusion effect. Additionally, we tested our proposed AEADS using the different statistical tests such as NIST, Histogram, chi-square, entropy, and correlation analysis. The experimental results obtained on the security performance of the proposed AEADS system are notable and the proposed system can then be used to protect data and authenticate their sources.
引用
收藏
页数:23
相关论文
共 49 条
[1]  
Abdoun N., 2018, Design and implementation of robust Keyed Hash functions based on Chaotic Neural Network
[2]   Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network [J].
Abdoun, Nabil ;
El Assad, Safwan ;
Thang Manh Hoang ;
Deforges, Olivier ;
Assaf, Rima ;
Khalil, Mohamad .
ENTROPY, 2020, 22 (09)
[3]   Design and security analysis of two robust keyed hash functions based on chaotic neural networks [J].
Abdoun, Nabil ;
El Assad, Safwan ;
Deforges, Olivier ;
Assaf, Rima ;
Khalil, Mohamad .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) :2137-2161
[4]  
Abdoun N, 2017, INT CONF INTERNET, P35, DOI 10.23919/ICITST.2017.8356341
[5]  
Abdoun N, 2016, INT CONF COMM, P405, DOI 10.1109/ICComm.2016.7528304
[6]  
Abdoun N, 2015, INT CONF INTERNET, P32, DOI 10.1109/ICITST.2015.7412051
[7]  
Abu Taha Mohammed, 2017, International Journal of Internet Technology and Secured Transactions, V7, P89
[8]  
[Anonymous], 2008, INT J MATH COMPUTATI, DOI DOI 10.5281/ZENODO.1072660
[9]  
Bao Zhenzhen., 2019, NIST Lightweight Compet. Round, V1, P115
[10]  
Barker E.B., 2007, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)