Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller

被引:46
|
作者
Murillo-Escobar, M. A. [1 ]
Cruz-Hernandez, C. [2 ]
Abundiz-Perez, F. [1 ]
Lopez-Gutierrez, R. M. [1 ]
机构
[1] Autonomous Univ Baja California UABC, Engn Architecture & Design Fac, Ensenada, BC, Mexico
[2] Sci Res & Adv Studies Ctr Ensenada CICESE, Elect & Telecommun Dept, Ensenada, BC, Mexico
关键词
Microcontroller; Embedded system; Chaos; Encryption; Security; IMAGE ENCRYPTION;
D O I
10.1016/j.micpro.2016.06.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, several embedded applications in military, industry, banking transference, e-commerce, biometric systems and others use insecure communication channels such as Internet to transmit or store confidential information. Therefore, the integrity and security of information are an important issue in continuous research. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a 32-bit microcontroller implementation of an improved text encryption algorithm (based on Murillo-Escobar's algorithm [13]) for real-time embedded systems and we present a complete security analysis such as key size analysis, key sensitivity, plain text sensitivity, floating frequency, histograms, N-grams, autocorrelation, information entropy, robustness against classic attacks, randomness analysis, and security characteristics. In addition, the digital implementation and performance are analyzed such as programming details, memory required, frequency system, implementation costs and encryption time. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded text encryption system is secure, effective and at low cost, and it could be implemented in real-time cryptosystem based on microcontroller. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:297 / 309
页数:13
相关论文
共 50 条
  • [1] Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller
    Janakiraman, Siva
    Thenmozhi, K.
    Rayappan, John Bosco Balaguru
    Amirtharajan, Rengarajan
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2018, 56 : 1 - 12
  • [2] A chaotic encryption scheme for real-time embedded systems: design and implementation
    Pande, Amit
    Zambreno, Joseph
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 551 - 561
  • [3] A chaotic encryption scheme for real-time embedded systems: design and implementation
    Amit Pande
    Joseph Zambreno
    [J]. Telecommunication Systems, 2013, 52 : 551 - 561
  • [4] Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems
    Pande, Amit
    Zambreno, Joseph
    [J]. 2010 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2010,
  • [5] Novel Integer Hahn Transform for Real-Time Lossless Image Authentication in IoT: A 32-Bit Microcontroller Implementation
    Daoui, Achraf
    Yamni, Mohamed
    Plawiak, Pawel
    Alblehai, Fahad
    Abd El-Latif, Ahmed A.
    [J]. IEEE ACCESS, 2024, 12 : 131044 - 131064
  • [6] A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System
    Li, Hao
    Deng, Lianbing
    Gu, Zhaoquan
    [J]. IEEE ACCESS, 2020, 8 (08): : 30127 - 30151
  • [7] 32-BIT ECLIPSE MINIS GET REAL-TIME OPERATING SYSTEM
    HALL, E
    [J]. ELECTRONIC DESIGN, 1982, 30 (04) : 34 - &
  • [8] 32-BIT MICROPROCESSORS TACKLE REAL-TIME SYSTEM CONTROL TASKS
    BURSKY, D
    [J]. ELECTRONIC DESIGN, 1988, 36 (09) : 71 - &
  • [9] REAL-TIME ENVIRONMENTS AIMED AT COST-SENSITIVE 32-BIT DESIGNS
    WILLIAMS, T
    [J]. COMPUTER DESIGN, 1992, 31 (10): : 44 - +
  • [10] An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers
    Es-sabry, Mohammed
    El Akkad, Nabil
    Khrissi, Lahbib
    Satori, Khalid
    El-Shafai, Walid
    Altameem, Torki
    Rathore, Rajkumar Singh
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2024, 25