Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction

نویسندگان

چکیده

In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) our neural network revised (CNNR). Unlike standard duplex construction (SDC), in MDC there are two phases: initialization phase duplexing phase, each contain CNNR formed by single layer, followed set of non-linear functions. The is implemented variants width, i.e., 512 1024 bits. We tested proposed scheme against different cryptanalytic attacks. fact, evaluated key message sensitivity, collision resistance analysis diffusion effect. Additionally, AEADS using statistical tests such as NIST, Histogram, chi-square, entropy, correlation analysis. experimental results obtained security performance system notable can then be used to protect data authenticate their sources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Parallel authenticated encryption with the duplex construction

The authentication encryption (AE) scheme based on the duplex construction can no be paralellized at the algorithmic level. To be competitive with some block cipher based modes like OCB (Offset CodeBook) or GCM (Galois Counter Mode), a scheme should allow parallel processing. In this note we show how parallel AE can be realized within the framework provided by the duplex construction. The first...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Permutation-based encryption, authentication and authenticated encryption

While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...

متن کامل

Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata

Recently an image encryption scheme based on chaotic maps and memory cellular automata has been proposed. In this paper, the security of the scheme is evaluated and it is demonstrated that the scheme can be broken by chosen plain-text attack. Having one or more monochrome plain-images and their corresponding cipherimages, a part of key-stream can be retrieved. Furthermore, it is discovered that...

متن کامل

Cryptography based on delayed chaotic neural networks ✩

In this Letter, a novel approach of encryption based on chaotic Hopfield neural networks with time varying delay is proposed. We use the chaotic neural network to generate binary sequences which will be used for masking plaintext. The plaintext is masked by switching of chaotic neural network maps and permutation of generated binary sequences. Simulation results were given to show the feasibili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2021

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym13122432