Skip to main content
Log in

Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we design and implement two new stream ciphers based on Pseudo Chaotic Number Generators (PCNGs) which integrate discrete chaotic maps, namely, Piecewise Linear Chaotic Map (PWLCM), Skewtent and Logistic map. They are weakly coupled by a predefined matrix A for the first PCNG and they are coupled by a binary diffusion matrix D for the second one. Each PCNG includes a chaotic multiplexing technique that allows the enhancement of the robustness of the system. The structure is implemented with finite precision N = 32 bits in C language. Security performance of the proposed stream ciphers is analysed and several cryptanalytic and statistical tests are applied. Experimental results highlight robustness as well as efficiency in terms of computation time of these two stream ciphers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Ahmed HEdH, Kalash HM, Allah OSF (2007) An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica 31(1)

  2. Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111

    Article  MATH  Google Scholar 

  3. Amato P, Mascolo D, Pedaci I, Ruggiero D (2006) Method of generating successions of pseudo-random bits or numbers. US Patent App 11/381:474

    Google Scholar 

  4. Arlicot A (2014) Sequences generator based on chaotic maps. Tech rep IETR, Rennes, France

  5. Barkan E, Biham E, Keller N (2003) Instant ciphertext-only cryptanalysis of gsm encrypted communication. In: Advances in cryptology-CRYPTO 2003. Springer, pp 600–616

  6. Bougouin M (2015) Time performance analysis of estream stream ciphers. Tech rep, IETR-Polytech Nantes, France

  7. Chai X, Yang K, Gan Z (2016) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools and Applications 1–21

  8. Ekdahl P, Johansson T (2000) Snow-a new stream cipher. In: Proceedings of first open NESSIE workshop, KU-Leuven, pp 167–168

  9. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  10. Elaine B, John K (2012) Recommendation for random number generation using deterministic random bit generators. Tech rep, NIST SP 800-90 rev a

  11. Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifurcation and Chaos 26(02):1650,021-1–1650,021-21

    Article  MATH  Google Scholar 

  12. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753–4769

    Article  MATH  Google Scholar 

  13. Jallouli O, Abutaha M, El Assad S, Chetto M, Queudet A, Deforges O (2016) Comparative study of two pseudo chaotic number generators for securing the iot. In: 2016 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1340–1344

  14. Klein A (2008) Attacks on the rc4 stream cipher. Des Codes Crypt 48(3):269–286

    Article  MathSciNet  MATH  Google Scholar 

  15. Klein A (2013) Introduction to stream ciphers. In: Stream ciphers. Springer, pp 1–13

  16. Kocarev L, Lian S (2011) Chaos-based cryptography. Springer

  17. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  18. Lozi R (2007) New enhanced chaotic number generators. Indian Journal of Industrial and Applied Mathematics 1(1):1–23

    Article  Google Scholar 

  19. Lozi R (2012) Emergence of randomness from chaos. International Journal of Bifurcation and Chaos 22(02):1250,021-1–1250,021-15

    Article  MathSciNet  MATH  Google Scholar 

  20. Maleki F, Mohades A, Hashemi SM, Shiri ME (2008) An image encryption system by cellular automata with memory. In: Third international conference on availability, reliability and security, 2008. ARES 08. IEEE, pp 1266–1271

  21. Manifavas C, Hatzivasilis G, Fysarakis K, Papaefstathiou Y (2015) A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks

  22. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  23. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  24. Petersen MV, Sørensen HMB (2007) Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data, US Patent 7,170,997

  25. Robshaw M (2008) The estream project. In: New stream cipher designs. Springer, pp 1–6

  26. Rogaway P, Coppersmith D (1998) A software-optimized encryption algorithm. J Cryptol 11(4):273–287

    Article  MATH  Google Scholar 

  27. Rukhin AL, Soto J, Nechvatal JR, Smid M, Barker EB, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2008) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., NIST SP 800-22 Rev 1

  28. Stallings W (2014) Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed

  29. Tang Y, Wang Z, Ja Fang (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468

    Article  MathSciNet  MATH  Google Scholar 

  30. Taralova I, Lozi R, El Assad S (2012) Chaotic generator synthesis: dynamical and statistical analysis. In: 2012 international conference for internet technology and secured transactions. IEEE, pp 56–59

  31. Vidal G, Baptista MS, Mancini H (2014) A fast and light stream cipher for smartphones. The European Physical Journal Special Topics 223(8):1601–1610

    Article  Google Scholar 

  32. Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83(4):2373–2391

    Article  MathSciNet  MATH  Google Scholar 

  33. Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652

    Article  MATH  Google Scholar 

  34. Wu Y, Noonan JP, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Cyber Journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), pp 31–38

  35. Zhang W, Wong Kw, Yu H, Zhu Zl (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  36. Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ons Jallouli.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jallouli, O., Assad, S.E., Chetto, M. et al. Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed Tools Appl 77, 13391–13417 (2018). https://doi.org/10.1007/s11042-017-4953-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4953-x

Keywords

Navigation