Affiliation:
1. Electronics and Microelectronics Laboratory (EµE), Faculty of Sciences of Monastir, University of Monastir, Monastir 5019, Tunisia
2. IETR UMR 6164, CNRS, University Nantes, F-44000 Nantes, France
Abstract
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map models, such as the Logistic, Skew-Tent, PWLCM, 3D-Chebyshev map, and 32-bit LFSR, which are the main components of the proposed chaotic generators. Based on the performance analysis collected from the discrete chaotic maps, we then designed, implemented, and analyzed the performance of three proposed robust pseudo-random number generators of chaotic sequences (PRNGs-CS) and their corresponding stream ciphers. The proposed PRNGs-CS are based on the predefined coupling matrix M. The latter achieves a weak mixing of the chaotic maps and a chaotic multiplexing technique or XOR operator for the output function. Therefore, the randomness of the sequences generated is expanded as well as their lengths, and divide-and-conquer attacks on chaotic systems are avoided. In addition, the proposed PRNGs-CS contain polynomial mappings of at least degree 2 or 3 to make algebraic attacks very difficult. Various experimental results obtained and analysis of performance in opposition to different kinds of numerical and cryptographic attacks determine the high level of security and good hardware metrics achieved by the proposed chaos system. The proposed system outperformed the state-of-the-art works in terms of high-security level and a high throughput which can be considered an alternative to the standard methods.
Subject
Statistics and Probability,Statistical and Nonlinear Physics,Analysis
Reference46 articles.
1. eSTREAM (2019, January 14). eSTREAM: The ECRYPT Stream Cipher Project. Available online: https://www.ecrypt.eu.org/stream/.
2. Robshaw, M. (2008). New Stream Cipher Designs, Springer.
3. A survey of lightweight stream ciphers for embedded systems;Manifavas;Secur. Commun. Netw.,2016
4. ETSI/SAGE (2021, December 17). Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification, Version: 1.5. Technical report, ETSI. Available online: http://www.gsmworld.com/documents/EEA3_EIA3_ZUC_v1_5.pdf.
5. Overview of ZUC Algorithm and its Contributions on the Security Success and Vulnerabilities of 4G Mobile Communication;Sulaiman;Int. J. Comput. Appl.,2017
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献