Abstract
Protection of private user information in computers and communication networks has been one of the major concerns during the last decade. It has become even more critical due to pervasive use of smart mobile devices, and is exacerbated due to their limited processing and battery power needed to manage complex encryption schemes, particularly for real-time multimedia applications (audio and video). Secure multimedia communication systems require processing of huge amounts of information at speeds ranging from Kilobits/sec (Kbs) to the order of Megabits/sec (Mbs). Provisioning of security for such large volumes of data in mobile devices may be simply infeasible when the complexity of related operations is beyond the processing limit of such devices. In this chapter we evaluate the performance of different encryption schemes, including AES implementations and non-conventional chaotic encryption on different architectures. Our experiments reveal that chaos-based schemes outperform the conventional AES implementation in terms of CPU usage, encryption speed, and energy consumption. Particularly they consume 300-400% less CPU power, and have over 250% faster encryption speed. However, the performance also depends on the floating point capability of the platform; a suitable scheme may be chosen depending on the CPU power of platform. The performance results reported in this chapter are based on experiments on contemporary desktops, laptops, netbooks, and cell phones (Nokia N800 and N900).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li, S., Mou, X., Ji, Z., Zhang, J., Cai, Y., Ji, Z., Zhang, J.: On the security of a chaotic encryption scheme: problems with computerized chaos. Comput. Phys. Commun. 153(1), 52–58 (2003)
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. Journ. Bifurcat. Chaos 15(10), 3119–3151 (2005)
Binder, P.M., Jensen, R.V.: Simulating chaotic behavior with finite-state machines. Physical Review A 34(5), 4460–4463 (1986)
Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circ. Syst. Mag. 1(3), 6–21 (2001)
Al-masalha, F., Khokhar, A., Hasimoto-Beltran, R.: Scalable Encryption of Variable Length Coded Video Bit Streams. In: The 35th IEEE Conference on Local Computer Networks, LCN 2010 (2010)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proc. of the SPIE, vol. 4666, pp. 149–160 (2002)
Lian, S., Sun, J., Wang, Z., Dai, Y.: A fast video encryption scheme based-on chaos. In: 8th IEEE International Conference on Control, Automation, Robotics and Vision (2004)
Hasimoto-Beltran, R.: High-performance multimedia encryption based on chaos. Chaos 18, 023110 (2008)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D., Eason, G.: SPINS: Security Protocols for sensor Networks. Wireless Networks 8, 521–534 (2002), doi:10.1023/A:1016598314198
Bernstein, D.J., Schwabe, P.: New AES Software Speed Records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 322–336. Springer, Heidelberg (2008)
Gladman, B.: AES and combined encryption/authentication modes (2006), http://fp.gladman.plus.com/AES/
PolarSSL, http://polarssl.org
Sang, T., Wang, R., Yan, Y.: Perturbance-based algorithm to expand cycle length chaotic key stream. Electron. Lett. 34, 873 (1998)
Clinton, J.S.: Chaos and Time-series Analysis. Oxford University Press, Oxford (2006)
Dellnitz, M., Field, M., Golubitsky, M., Hohmann, A., Ma, J.: Cycling chaos. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 42, 821 (1995)
Cernak, J.: Digital generators of chaos. Phys. Lett. A 214, 151 (1996)
Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75 (2003)
Álvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic system using external key. Phys. Lett. A 319, 334 (2003)
National Institute of Standards and Technology (NIST): FIPS-197: Advanced Encryption Standard (AES), http://www.csrc.nist.gov/publications/fips/fips197/fips/-197.pdf
Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75–93. Springer, Heidelberg (2010)
Maemo, http://maemo.org/
Hu, H., Xu, Y., Zhu, Z.: A method of improving the properties of digital chaotic system. Chaos, Solitons Fractals 38, 439–446 (2008)
Cernak, J.: Digital generators of chaos. Phys. Lett. A 214, 151–160 (1996)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749 (2004)
Fridrich, J.: Symmetric ciphers based on Two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8, 1259–1284 (1998)
Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat. Chaos 14(10), 3613–3624 (2004)
Xu, D., Li, Z., Bishop, S.R., Galvanetto, U.: Estimation of periodic-like motions of chaotic evolutions using detected unstable periodic patterns. Patt. Recog. Lett. 23, 245–252 (2002)
Davidchack, R.L., Lai, Y.-C.: Efficient algorithm for detecting unstable periodic orbits in chaotic systems. Phys. Rev. E 60, 6172–6175 (1999)
Saiki, Y.: Numerical detection of unstable periodic orbits in continuous-time dynamical systems with chaotic behavior. Nonlin. Processes Geophys. 14, 615–620 (2007)
Pei, X., Dolan, K., Moss, F.: Counting unstable periodic orbits in noisy systems: A scaling relation connecting experiment with theory. Chaos 8, 853–860 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hasimoto-Beltran, R., Al-Masalha, F., Khokhar, A. (2011). Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-20542-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20541-5
Online ISBN: 978-3-642-20542-2
eBook Packages: EngineeringEngineering (R0)