A Chaos-Based Authenticated Cipher with Associated Data

In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2017-01, Vol.2017 (2017), p.1-15
Hauptverfasser: Teh, Je Sen, Samsudin, Azman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 15
container_issue 2017
container_start_page 1
container_title Security and communication networks
container_volume 2017
creator Teh, Je Sen
Samsudin, Azman
description In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.
doi_str_mv 10.1155/2017/9040518
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786160</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786160</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</originalsourceid><addsrcrecordid>eNqF0E1LxDAQBuAgCq6rN89S8Kh1Z5qv5ljrJyx40XNIm4Rm0e3atCz-e7t20aOHMJnhYQZeQs4RbhA5X2SAcqGAAcf8gMxQUZUCZtnh7x_ZMTmJcQUgkEk2I7JIysa0Mb010dmkGPrGrftQm37syrBpXJdsQ98kRYxtHX7Gd6Y3p-TIm_fozvZ1Tt4e7l_Lp3T58vhcFsu0pgL61FNfcem8ranMrMtrwCrzwMYHxueIuQXqBTdMSqcqpoSruAVnLFbCC0nn5HLau-naz8HFXq_aoVuPJ3XGOJe5QAGjup5U3bUxds7rTRc-TPelEfQuGr2LRu-jGfnVxJuwtmYb_tMXk3ajcd786QwoKkW_AWGia14</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786160</pqid></control><display><type>article</type><title>A Chaos-Based Authenticated Cipher with Associated Data</title><source>Wiley-Blackwell Open Access Titles</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Teh, Je Sen ; Samsudin, Azman</creator><contributor>Caballero-Gil, Pino</contributor><creatorcontrib>Teh, Je Sen ; Samsudin, Azman ; Caballero-Gil, Pino</creatorcontrib><description>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2017/9040518</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Authentication ; Data encryption ; Design specifications ; Digital signatures ; Encryption ; Parameter estimation ; Prime numbers ; Random numbers ; Software</subject><ispartof>Security and communication networks, 2017-01, Vol.2017 (2017), p.1-15</ispartof><rights>Copyright © 2017 Je Sen Teh and Azman Samsudin.</rights><rights>Copyright © 2017 Je Sen Teh and Azman Samsudin. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</citedby><cites>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</cites><orcidid>0000-0001-9981-7958 ; 0000-0001-5571-4148</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Caballero-Gil, Pino</contributor><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Samsudin, Azman</creatorcontrib><title>A Chaos-Based Authenticated Cipher with Associated Data</title><title>Security and communication networks</title><description>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Data encryption</subject><subject>Design specifications</subject><subject>Digital signatures</subject><subject>Encryption</subject><subject>Parameter estimation</subject><subject>Prime numbers</subject><subject>Random numbers</subject><subject>Software</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0E1LxDAQBuAgCq6rN89S8Kh1Z5qv5ljrJyx40XNIm4Rm0e3atCz-e7t20aOHMJnhYQZeQs4RbhA5X2SAcqGAAcf8gMxQUZUCZtnh7x_ZMTmJcQUgkEk2I7JIysa0Mb010dmkGPrGrftQm37syrBpXJdsQ98kRYxtHX7Gd6Y3p-TIm_fozvZ1Tt4e7l_Lp3T58vhcFsu0pgL61FNfcem8ranMrMtrwCrzwMYHxueIuQXqBTdMSqcqpoSruAVnLFbCC0nn5HLau-naz8HFXq_aoVuPJ3XGOJe5QAGjup5U3bUxds7rTRc-TPelEfQuGr2LRu-jGfnVxJuwtmYb_tMXk3ajcd786QwoKkW_AWGia14</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Teh, Je Sen</creator><creator>Samsudin, Azman</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-9981-7958</orcidid><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid></search><sort><creationdate>20170101</creationdate><title>A Chaos-Based Authenticated Cipher with Associated Data</title><author>Teh, Je Sen ; Samsudin, Azman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Data encryption</topic><topic>Design specifications</topic><topic>Digital signatures</topic><topic>Encryption</topic><topic>Parameter estimation</topic><topic>Prime numbers</topic><topic>Random numbers</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Samsudin, Azman</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Teh, Je Sen</au><au>Samsudin, Azman</au><au>Caballero-Gil, Pino</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Chaos-Based Authenticated Cipher with Associated Data</atitle><jtitle>Security and communication networks</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>2017</volume><issue>2017</issue><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2017/9040518</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-9981-7958</orcidid><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2017-01, Vol.2017 (2017), p.1-15
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455786160
source Wiley-Blackwell Open Access Titles; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Authentication
Data encryption
Design specifications
Digital signatures
Encryption
Parameter estimation
Prime numbers
Random numbers
Software
title A Chaos-Based Authenticated Cipher with Associated Data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T17%3A49%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Chaos-Based%20Authenticated%20Cipher%20with%20Associated%20Data&rft.jtitle=Security%20and%20communication%20networks&rft.au=Teh,%20Je%20Sen&rft.date=2017-01-01&rft.volume=2017&rft.issue=2017&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2017/9040518&rft_dat=%3Cproquest_cross%3E2455786160%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455786160&rft_id=info:pmid/&rfr_iscdi=true