Enhanced lightweight encryption algorithm based on chaotic systems

被引:0
|
作者
Abdelli, Ali [1 ]
Youssef, Wajih El Hadj [1 ]
Khriji, Lazhar [2 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Lab E E, FSM, Monastir 5019, Tunisia
[2] Sultan Qaboos Univ, Coll Engn, Dept Elect & Comp Engn, Muscat 123, Oman
关键词
lightweight cryptography; chaotic systems; lightweight hash functions; key stream; security analysis; DESIGN;
D O I
10.1088/1402-4896/ad75c5
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to improve security and efficiency, this study presents a novel lightweight encryption technique that makes use of chaotic systems. Our method creatively combines the new chaotic KLEIN_64 algorithm with the Keccak-256 hash function, offering a solid basis for producing initial values essential for causing chaotic maps during the encryption process. After a deep validation with rigorous NIST testing, our chaotic pseudo random generator, LAC, exhibits excellent reliability and cryptographic robustness. Furthermore, the complexity of the cryptographic round function is improved by incorporating a second chaotic pseudo random generator that combines chaotic LFSR and Skew Tent Maps, thereby fortifying security measures.Designed with resource-limited applications in mind, our approach ensures that the cryptosystem remains both lightweight and efficient, meeting the stringent constraints typical of such environments. The practical feasibility and performance of our approach are extensively evaluated through FPGA implementation on the Zybo 7Z010 platform. Our implementation achieves a remarkable throughput of 2.820 Gbps while maintaining optimal resource utilization and efficiency. Extensive experimental results confirm the superior security of our cryptosystem, with correlation tests, entropy measurement, and histogram analysis showcasing robustness against statistical attacks. Moreover, the cryptosystem shows little fluctuation in the Unified Average Changing Intensity (UACI) and Non-Linear Pixel Change Rate (NPCR), confirming its resistance to differential attacks. Overall, our technique advances lightweight cryptography by providing a robust and efficient solution to modern cybersecurity challenges. In particular, our approach is well-suited for applications with limited resources, ensuring that security is maintained without compromising on performance or efficiency, thus fulfilling the needs of modern, constrained environments.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [32] An image encryption algorithm based on mixed chaotic dynamic systems and external keys
    Fei, P
    Qiu, SS
    Min, L
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 1135 - 1139
  • [33] A fast color image encryption algorithm based on hyper-chaotic systems
    Benyamin Norouzi
    Sattar Mirzakuchaki
    Nonlinear Dynamics, 2014, 78 : 995 - 1015
  • [34] A novel image encryption algorithm based on double hyper-chaotic systems
    Dong, Enzeng
    Chen, Zaiping
    Chen, Zengqiang
    Li, Haifen
    Xia, Chengyi
    ICIC Express Letters, 2010, 4 (05): : 1439 - 1444
  • [35] Image encryption algorithm based on chaotic system
    Fan, Jiu-Lun
    Zhang, Xue-Feng
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 767 - 771
  • [36] A fast color image encryption algorithm based on hyper-chaotic systems
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    NONLINEAR DYNAMICS, 2014, 78 (02) : 995 - 1015
  • [37] Image Encryption Algorithm Based on Chaotic Mapping
    Dong, Yupu
    Liu, Jiasheng
    Zhu, Canyan
    Wang, Yiming
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 289 - 291
  • [38] Chaotic encryption algorithm based on control word
    Zhang, Li
    Zhang, Liyong
    Yang, Chang
    Sun, Cao
    Journal of Information and Computational Science, 2008, 5 (06): : 2529 - 2536
  • [39] Image encryption algorithm based on chaotic sequence
    Zhang, Yong-Hong
    Kang, Bao-Sheng
    Zhang, Xue-Feng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 221 - +
  • [40] Hybrid chaotic encryption algorithm for securing DICOM systems
    Jiao G.
    Zhou S.
    Li L.
    Zou Y.
    International Journal of Performability Engineering, 2019, 15 (05) : 1436 - 1444