Abstract
In this paper, we design and implement two new stream ciphers based on Pseudo Chaotic Number Generators (PCNGs) which integrate discrete chaotic maps, namely, Piecewise Linear Chaotic Map (PWLCM), Skewtent and Logistic map. They are weakly coupled by a predefined matrix A for the first PCNG and they are coupled by a binary diffusion matrix D for the second one. Each PCNG includes a chaotic multiplexing technique that allows the enhancement of the robustness of the system. The structure is implemented with finite precision N = 32 bits in C language. Security performance of the proposed stream ciphers is analysed and several cryptanalytic and statistical tests are applied. Experimental results highlight robustness as well as efficiency in terms of computation time of these two stream ciphers.
Similar content being viewed by others
References
Ahmed HEdH, Kalash HM, Allah OSF (2007) An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica 31(1)
Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111
Amato P, Mascolo D, Pedaci I, Ruggiero D (2006) Method of generating successions of pseudo-random bits or numbers. US Patent App 11/381:474
Arlicot A (2014) Sequences generator based on chaotic maps. Tech rep IETR, Rennes, France
Barkan E, Biham E, Keller N (2003) Instant ciphertext-only cryptanalysis of gsm encrypted communication. In: Advances in cryptology-CRYPTO 2003. Springer, pp 600–616
Bougouin M (2015) Time performance analysis of estream stream ciphers. Tech rep, IETR-Polytech Nantes, France
Chai X, Yang K, Gan Z (2016) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools and Applications 1–21
Ekdahl P, Johansson T (2000) Snow-a new stream cipher. In: Proceedings of first open NESSIE workshop, KU-Leuven, pp 167–168
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157
Elaine B, John K (2012) Recommendation for random number generation using deterministic random bit generators. Tech rep, NIST SP 800-90 rev a
Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifurcation and Chaos 26(02):1650,021-1–1650,021-21
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753–4769
Jallouli O, Abutaha M, El Assad S, Chetto M, Queudet A, Deforges O (2016) Comparative study of two pseudo chaotic number generators for securing the iot. In: 2016 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1340–1344
Klein A (2008) Attacks on the rc4 stream cipher. Des Codes Crypt 48(3):269–286
Klein A (2013) Introduction to stream ciphers. In: Stream ciphers. Springer, pp 1–13
Kocarev L, Lian S (2011) Chaos-based cryptography. Springer
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327
Lozi R (2007) New enhanced chaotic number generators. Indian Journal of Industrial and Applied Mathematics 1(1):1–23
Lozi R (2012) Emergence of randomness from chaos. International Journal of Bifurcation and Chaos 22(02):1250,021-1–1250,021-15
Maleki F, Mohades A, Hashemi SM, Shiri ME (2008) An image encryption system by cellular automata with memory. In: Third international conference on availability, reliability and security, 2008. ARES 08. IEEE, pp 1266–1271
Manifavas C, Hatzivasilis G, Fysarakis K, Papaefstathiou Y (2015) A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Petersen MV, Sørensen HMB (2007) Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data, US Patent 7,170,997
Robshaw M (2008) The estream project. In: New stream cipher designs. Springer, pp 1–6
Rogaway P, Coppersmith D (1998) A software-optimized encryption algorithm. J Cryptol 11(4):273–287
Rukhin AL, Soto J, Nechvatal JR, Smid M, Barker EB, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2008) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., NIST SP 800-22 Rev 1
Stallings W (2014) Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed
Tang Y, Wang Z, Ja Fang (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468
Taralova I, Lozi R, El Assad S (2012) Chaotic generator synthesis: dynamical and statistical analysis. In: 2012 international conference for internet technology and secured transactions. IEEE, pp 56–59
Vidal G, Baptista MS, Mancini H (2014) A fast and light stream cipher for smartphones. The European Physical Journal Special Topics 223(8):1601–1610
Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83(4):2373–2391
Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652
Wu Y, Noonan JP, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Cyber Journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), pp 31–38
Zhang W, Wong Kw, Yu H, Zhu Zl (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jallouli, O., Assad, S.E., Chetto, M. et al. Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed Tools Appl 77, 13391–13417 (2018). https://doi.org/10.1007/s11042-017-4953-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4953-x