Processing math: 100%
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (8)

Search Parameters:
Keywords = skew tent map

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 22304 KiB  
Article
A High-Performance FPGA PRNG Based on Multiple Deep-Dynamic Transformations
by Shouliang Li, Zichen Lin, Yi Yang and Ruixuan Ning
Entropy 2024, 26(8), 671; https://doi.org/10.3390/e26080671 - 7 Aug 2024
Cited by 1 | Viewed by 1639
Abstract
Pseudo-random number generators (PRNGs) are important cornerstones of many fields, such as statistical analysis and cryptography, and the need for PRNGs for information security (in fields such as blockchain, big data, and artificial intelligence) is becoming increasingly prominent, resulting in a steadily growing [...] Read more.
Pseudo-random number generators (PRNGs) are important cornerstones of many fields, such as statistical analysis and cryptography, and the need for PRNGs for information security (in fields such as blockchain, big data, and artificial intelligence) is becoming increasingly prominent, resulting in a steadily growing demand for high-speed, high-quality random number generators. To meet this demand, the multiple deep-dynamic transformation (MDDT) algorithm is innovatively developed. This algorithm is incorporated into the skewed tent map, endowing it with more complex dynamical properties. The improved one-dimensional discrete chaotic mapping method is effectively realized on a field-programmable gate array (FPGA), specifically the Xilinx xc7k325tffg900-2 model. The proposed pseudo-random number generator (PRNG) successfully passes all evaluations of the National Institute of Standards and Technology (NIST) SP800-22, diehard, and TestU01 test suites. Additional experimental results show that the PRNG, possessing high novelty performance, operates efficiently at a clock frequency of 150 MHz, achieving a maximum throughput of 14.4 Gbps. This performance not only surpasses that of most related studies but also makes it exceptionally suitable for embedded applications. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

17 pages, 3284 KiB  
Article
Chaotic Orthogonal Composite Sequence for 5G NR Time Service Signal Capture Algorithm
by Zhiwei Mao, Huabing Wu, Dangli Zhao and Xingbo Jiang
Electronics 2024, 13(13), 2648; https://doi.org/10.3390/electronics13132648 - 5 Jul 2024
Cited by 1 | Viewed by 827
Abstract
Establishing a national comprehensive PNT (Positioning, Navigation, and Timing) system has become a consensus among major countries worldwide. As a crucial component in completing the entire PNT system, the 5G NR (new radio) time service signal plays a vital role. This paper proposes [...] Read more.
Establishing a national comprehensive PNT (Positioning, Navigation, and Timing) system has become a consensus among major countries worldwide. As a crucial component in completing the entire PNT system, the 5G NR (new radio) time service signal plays a vital role. This paper proposes a 5G NR time service signal that uses a spread spectrum system, shares the 5G signal frequency band, but does not occupy the bandwidth of the 5G communication signal. This timing service signal has relatively low power, making it appear “submerged” within the power of the 5G communication signal. The spread spectrum code for this timing signal employs the chaotic orthogonal composite sequence proposed in this paper. Compared to traditional spread spectrum sequences, this sequence offers better security than m-sequences, improved autocorrelation than Walsh sequences, and an effective suppression of the short-period characteristics exhibited when the Skew Tent-Map chaotic sequence takes special values. This paper simulates the capture of the 5G NR time service signal in an environment with a signal-to-noise ratio of 10 dB using an FFT-based parallel code phase search algorithm, successfully capturing the 5G NR time service signal and verifying the feasibility of the proposed chaotic orthogonal composite sequence as a spread spectrum code. Full article
Show Figures

Figure 1

26 pages, 13945 KiB  
Article
Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers
by Fethi Dridi, Safwan El Assad, Wajih El Hadj Youssef and Mohsen Machhout
Fractal Fract. 2023, 7(2), 197; https://doi.org/10.3390/fractalfract7020197 - 17 Feb 2023
Cited by 12 | Viewed by 3014
Abstract
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map models, such as the [...] Read more.
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map models, such as the Logistic, Skew-Tent, PWLCM, 3D-Chebyshev map, and 32-bit LFSR, which are the main components of the proposed chaotic generators. Based on the performance analysis collected from the discrete chaotic maps, we then designed, implemented, and analyzed the performance of three proposed robust pseudo-random number generators of chaotic sequences (PRNGs-CS) and their corresponding stream ciphers. The proposed PRNGs-CS are based on the predefined coupling matrix M. The latter achieves a weak mixing of the chaotic maps and a chaotic multiplexing technique or XOR operator for the output function. Therefore, the randomness of the sequences generated is expanded as well as their lengths, and divide-and-conquer attacks on chaotic systems are avoided. In addition, the proposed PRNGs-CS contain polynomial mappings of at least degree 2 or 3 to make algebraic attacks very difficult. Various experimental results obtained and analysis of performance in opposition to different kinds of numerical and cryptographic attacks determine the high level of security and good hardware metrics achieved by the proposed chaos system. The proposed system outperformed the state-of-the-art works in terms of high-security level and a high throughput which can be considered an alternative to the standard methods. Full article
(This article belongs to the Special Issue Advances in Fractional-Order Embedded Systems)
Show Figures

Figure 1

29 pages, 14161 KiB  
Article
Function Composition from Sine Function and Skew Tent Map and Its Application to Pseudorandom Number Generators
by Leonardo Palacios-Luengas, Ricardo Marcelín-Jiménez, Enrique Rodriguez-Colina, Michael Pascoe-Chalke, Omar Jiménez-Ramírez and Rubén Vázquez-Medina
Appl. Sci. 2021, 11(13), 5769; https://doi.org/10.3390/app11135769 - 22 Jun 2021
Cited by 4 | Viewed by 3439
Abstract
In cryptography, the pseudorandom number sequences must have random appearance to be used in secure information systems. The skew tent map (STM) is an attractive map to produce pseudorandom sequences due to its easy implementation and the absence of stability islands when it [...] Read more.
In cryptography, the pseudorandom number sequences must have random appearance to be used in secure information systems. The skew tent map (STM) is an attractive map to produce pseudorandom sequences due to its easy implementation and the absence of stability islands when it is in chaotic behavior. Using the STM and sine function, we propose and analyze a function composition to propose a pseudorandom number generator (PRNG). In the analysis of the function composition, we use the bifurcation diagram and the Lyapunov exponent to perform a behavioral comparison against the STM. We show that the proposed function composition is more sensitive to initial conditions than the STM, and then it is a better option than the STM for cryptography applications. For the proposed function we determine and avoid the chaos annulling traps. The proposed PRNG can be configured to generate pseudorandom numbers of 8, 16 or 32 bits and it can be implemented on microcontrollers with different architectures. We evaluate the pseudorandomness of the proposed PRNG using the NIST SP 800-22 and TestU01 suites. Additionally, to evaluate its quality, we apply tests such as correlation coefficient, key sensitivity, statistical and entropy analysis, key space, linear complexity, and speed. Finally, we performed a comparison with similar PRNGs that produce pseudorandom sequences considering numbers of 8 and 32 bits. The results show that the proposed PRNG maintains its security regardless of the selected configuration. The proposed PRNG has five important features: easy implementation, configurable to produce number with 8, 16 or 32 bits, high processing speed, high linear complexity, and wide key space. These features are necessary for cryptographic systems. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

19 pages, 5812 KiB  
Article
The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator
by Fethi Dridi, Safwan El Assad, Wajih El Hadj Youssef, Mohsen Machhout and René Lozi
Appl. Sci. 2021, 11(2), 625; https://doi.org/10.3390/app11020625 - 11 Jan 2021
Cited by 28 | Viewed by 4223
Abstract
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the system is the proposed secure pseudo-chaotic number [...] Read more.
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the system is the proposed secure pseudo-chaotic number generator (SPCNG). The architecture of the proposed SPCNG includes three first-order recursive filters, each containing a discrete chaotic map and a mixing technique using an internal pseudo-random number (PRN). The three discrete chaotic maps, namely, the 3D Chebyshev map (3D Ch), the 1D logistic map (L), and the 1D skew-tent map (S), are weakly coupled by a predefined coupling matrix M. The mixing technique combined with the weak coupling technique of the three chaotic maps allows preserving the system against side-channel attacks (SCAs). The proposed system was implemented on a Xilinx XC7Z020 PYNQ-Z2 FPGA platform. Logic resources, throughput, and cryptanalytic and statistical tests showed a good tradeoff between efficiency and security. Thus, the proposed SCbSC can be used as a secure stream cipher. Full article
(This article belongs to the Special Issue Cryptography and Its Applications in Information Security)
Show Figures

Figure 1

12 pages, 7374 KiB  
Article
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing
by Di Xiao, Min Li and Hongying Zheng
Sensors 2020, 20(5), 1517; https://doi.org/10.3390/s20051517 - 10 Mar 2020
Cited by 7 | Viewed by 4120
Abstract
Recently, the rapid development of the Internet of Things (IoT) has led to an increasing exponential growth of non-scalar data (e.g., images, videos). Local services are far from satisfying storage requirements, and the cloud computing fails to effectively support heterogeneous distributed IoT environments, [...] Read more.
Recently, the rapid development of the Internet of Things (IoT) has led to an increasing exponential growth of non-scalar data (e.g., images, videos). Local services are far from satisfying storage requirements, and the cloud computing fails to effectively support heterogeneous distributed IoT environments, such as wireless sensor network. To effectively provide smart privacy protection for video data storage, we take full advantage of three patterns (multi-access edge computing, cloudlets and fog computing) of edge computing to design the hierarchical edge computing architecture, and propose a low-complexity and high-secure scheme based on it. The video is divided into three parts and stored in completely different facilities. Specifically, the most significant bits of key frames are directly stored in local sensor devices while the least significant bits of key frames are encrypted and sent to the semi-trusted cloudlets. The non-key frame is compressed with the two-layer parallel compressive sensing and encrypted by the 2D logistic-skew tent map and then transmitted to the cloud. Simulation experiments and theoretical analysis demonstrate that our proposed scheme can not only provide smart privacy protection for big video data storage based on the hierarchical edge computing, but also avoid increasing additional computation burden and storage pressure. Full article
(This article belongs to the Collection Fog/Edge Computing based Smart Sensing System)
Show Figures

Figure 1

10 pages, 2726 KiB  
Article
A 1 Gbps Chaos-Based Stream Cipher Implemented in 0.18 μm CMOS Technology
by Miguel Garcia-Bosque, Guillermo Díez-Señorans, Adrián Pérez-Resa, Carlos Sánchez-Azqueta, Concepción Aldea and Santiago Celma
Electronics 2019, 8(6), 623; https://doi.org/10.3390/electronics8060623 - 1 Jun 2019
Cited by 8 | Viewed by 3630
Abstract
In this work, a novel chaos-based stream cipher based on a skew tent map is proposed and implemented in a 0.18 μm CMOS (Complementary Metal-Oxide-Semiconductor) technology. The proposed ciphering algorithm uses a linear feedback shift register that perturbs the orbits generated by the [...] Read more.
In this work, a novel chaos-based stream cipher based on a skew tent map is proposed and implemented in a 0.18 μm CMOS (Complementary Metal-Oxide-Semiconductor) technology. The proposed ciphering algorithm uses a linear feedback shift register that perturbs the orbits generated by the skew tent map after each iteration. This way, the randomness of the generated sequences is considerably improved. The implemented stream cipher was capable of achieving encryption speeds of 1 Gbps by using an approximate area of ~20,000 2-NAND equivalent gates, with a power consumption of 24.1 mW. To test the security of the proposed cipher, the generated keystreams were subjected to National Institute of Standards and Technology (NIST) randomness tests, proving that they were undistinguishable from truly random sequences. Finally, other security aspects such as the key sensitivity, key space size, and security against reconstruction attacks were studied, proving that the stream cipher is secure. Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

13 pages, 5580 KiB  
Article
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher
by Miguel Garcia-Bosque, Adrián Pérez, Carlos Sánchez-Azqueta and Santiago Celma
Sensors 2017, 17(3), 646; https://doi.org/10.3390/s17030646 - 21 Mar 2017
Cited by 24 | Viewed by 6453
Abstract
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and [...] Read more.
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and tested in a Field Programmable Gate Array (FPGA) and was able to generate 8-bit width data streams at a clock frequency of 134 MHz, which is fast enough for Gigabit Ethernet applications. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. The stream cipher was compared with other chaotic stream ciphers implemented on similar platforms in terms of area, power consumption, and throughput. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

Back to TopTop