Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers
نویسندگان
چکیده
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, performed the statistical security hardware metrics of certain discrete chaotic map models, such as Logistic, Skew-Tent, PWLCM, 3D-Chebyshev map, 32-bit LFSR, which are main components proposed generators. Based performance analysis collected from maps, then designed, implemented, analyzed robust pseudo-random number generators sequences (PRNGs-CS) their corresponding ciphers. The PRNGs-CS based predefined coupling matrix M. latter achieves a weak mixing maps multiplexing technique or XOR operator output function. Therefore, randomness generated is expanded well lengths, divide-and-conquer attacks systems avoided. addition, contain polynomial mappings at least degree 2 3 to make algebraic very difficult. Various experimental results obtained in opposition different kinds numerical cryptographic determine high level good achieved by chaos system. system outperformed state-of-the-art works terms high-security throughput can be considered alternative standard methods.
منابع مشابه
Comparison of the Hardware Implementation of Stream Ciphers
In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area in an FPGA device. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of well-known standards, especially wireless communication protocols. The Helix cipher is a recently introduce...
متن کاملHardware Implementation of Modified RC4 Stream Cipher Using FPGA
— In this project work, an efficient hardware Implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in the memory size the strength of encryption can be increased. Design of RC4 stream cipher for data ...
متن کاملOn the Design and Analysis of Stream Ciphers
T thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. A new class of weak feedback polynomials for linear feedback shift registers is identified. By taking samples corresponding to the linear ...
متن کاملAn FPGA Implementation of Chaos based Image Encryption and its Performance Analysis
Today, hardware chip design with FPGA implementation for designing secure crypto processor is a growing topic due to rapidly increasing attack on digital images over internet network. In this paper, an FPGA implementation of Chaotic Map based two phase image encryption technique is proposed. First phase consists of pixel position permutation and second phase consists of bit value position permu...
متن کاملSecurity of Block Ciphers - From Algorithm Design to Hardware Implementation
Will reading habit influence your life? Many say yes. Reading security of block ciphers from algorithm design to hardware implementation is a good habit; you can develop this habit to be such interesting way. Yeah, reading habit will not only make you have any favourite activity. It will be one of guidance of your life. When reading has become a habit, you will not make it as disturbing activit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Fractal and fractional
سال: 2023
ISSN: ['2504-3110']
DOI: https://doi.org/10.3390/fractalfract7020197