2019
DOI: 10.3390/sym11070853
|View full text |Cite
|
Sign up to set email alerts
|

A New Lightweight Stream Cipher Based on Chaos

Abstract: A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA). Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 40 publications
1
25
0
Order By: Relevance
“…In a similar way, the authors in [19] showed the effects of time delay on burst synchronization transitions of a neural network which was locally modeled by Hindmarsh-Rose neurons. On the one hand, the main drawback of those works was the lack of statistical tests according to the National Institute of Standard and Technology (NIST), as done in other chaotic systems given in [20][21][22], to guarantee the randomness of the chaotic sequences. On the other hand, and in addition to NIST tests, the authors in [23] recommend to improve the key space when using chaotic maps, thus enhancing the image encryption schemes.…”
mentioning
confidence: 99%
“…In a similar way, the authors in [19] showed the effects of time delay on burst synchronization transitions of a neural network which was locally modeled by Hindmarsh-Rose neurons. On the one hand, the main drawback of those works was the lack of statistical tests according to the National Institute of Standard and Technology (NIST), as done in other chaotic systems given in [20][21][22], to guarantee the randomness of the chaotic sequences. On the other hand, and in addition to NIST tests, the authors in [23] recommend to improve the key space when using chaotic maps, thus enhancing the image encryption schemes.…”
mentioning
confidence: 99%
“…These outputs have been converted to random number sequences with the help of various conversion functions. There are many suggestions in this design approach that use different chaotic systems and different conversion functions [20][21][22][23]. Electronic circuit simulations of chaotic systems are generally used in chaos based TRNG designs.…”
Section: Chaos and Randomnessmentioning
confidence: 99%
“…It has been suggested that different entropy sources can be produced by using different initial conditions and control parameters, as they will produce different outputs with small changes that may occur in the initial conditions and control parameters. Many cryptographic protocols such as image encryption algorithms [10,11], key generators [12,13] and s-box designs [14] have been proposed using this design idea, as visualized in Figure 1. Although this design approach has been widely studied, the security analysis of some proposals has not been done according to certain criteria, which has caused various security problems.…”
Section: Chaos-based S-box Structuresmentioning
confidence: 99%