A Chaos-Based Authenticated Cipher with Associated Data
In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and t...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2017-01, Vol.2017 (2017), p.1-15 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | 2017 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2017 |
creator | Teh, Je Sen Samsudin, Azman |
description | In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption. |
doi_str_mv | 10.1155/2017/9040518 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786160</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786160</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</originalsourceid><addsrcrecordid>eNqF0E1LxDAQBuAgCq6rN89S8Kh1Z5qv5ljrJyx40XNIm4Rm0e3atCz-e7t20aOHMJnhYQZeQs4RbhA5X2SAcqGAAcf8gMxQUZUCZtnh7x_ZMTmJcQUgkEk2I7JIysa0Mb010dmkGPrGrftQm37syrBpXJdsQ98kRYxtHX7Gd6Y3p-TIm_fozvZ1Tt4e7l_Lp3T58vhcFsu0pgL61FNfcem8ranMrMtrwCrzwMYHxueIuQXqBTdMSqcqpoSruAVnLFbCC0nn5HLau-naz8HFXq_aoVuPJ3XGOJe5QAGjup5U3bUxds7rTRc-TPelEfQuGr2LRu-jGfnVxJuwtmYb_tMXk3ajcd786QwoKkW_AWGia14</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786160</pqid></control><display><type>article</type><title>A Chaos-Based Authenticated Cipher with Associated Data</title><source>Wiley-Blackwell Open Access Titles</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Teh, Je Sen ; Samsudin, Azman</creator><contributor>Caballero-Gil, Pino</contributor><creatorcontrib>Teh, Je Sen ; Samsudin, Azman ; Caballero-Gil, Pino</creatorcontrib><description>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2017/9040518</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Authentication ; Data encryption ; Design specifications ; Digital signatures ; Encryption ; Parameter estimation ; Prime numbers ; Random numbers ; Software</subject><ispartof>Security and communication networks, 2017-01, Vol.2017 (2017), p.1-15</ispartof><rights>Copyright © 2017 Je Sen Teh and Azman Samsudin.</rights><rights>Copyright © 2017 Je Sen Teh and Azman Samsudin. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</citedby><cites>FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</cites><orcidid>0000-0001-9981-7958 ; 0000-0001-5571-4148</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Caballero-Gil, Pino</contributor><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Samsudin, Azman</creatorcontrib><title>A Chaos-Based Authenticated Cipher with Associated Data</title><title>Security and communication networks</title><description>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Data encryption</subject><subject>Design specifications</subject><subject>Digital signatures</subject><subject>Encryption</subject><subject>Parameter estimation</subject><subject>Prime numbers</subject><subject>Random numbers</subject><subject>Software</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0E1LxDAQBuAgCq6rN89S8Kh1Z5qv5ljrJyx40XNIm4Rm0e3atCz-e7t20aOHMJnhYQZeQs4RbhA5X2SAcqGAAcf8gMxQUZUCZtnh7x_ZMTmJcQUgkEk2I7JIysa0Mb010dmkGPrGrftQm37syrBpXJdsQ98kRYxtHX7Gd6Y3p-TIm_fozvZ1Tt4e7l_Lp3T58vhcFsu0pgL61FNfcem8ranMrMtrwCrzwMYHxueIuQXqBTdMSqcqpoSruAVnLFbCC0nn5HLau-naz8HFXq_aoVuPJ3XGOJe5QAGjup5U3bUxds7rTRc-TPelEfQuGr2LRu-jGfnVxJuwtmYb_tMXk3ajcd786QwoKkW_AWGia14</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Teh, Je Sen</creator><creator>Samsudin, Azman</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-9981-7958</orcidid><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid></search><sort><creationdate>20170101</creationdate><title>A Chaos-Based Authenticated Cipher with Associated Data</title><author>Teh, Je Sen ; Samsudin, Azman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-f3fb57efdc372de8c01b2f042f00af8118d03f65a477e9b496eb5d0ead1b6f673</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Data encryption</topic><topic>Design specifications</topic><topic>Digital signatures</topic><topic>Encryption</topic><topic>Parameter estimation</topic><topic>Prime numbers</topic><topic>Random numbers</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Samsudin, Azman</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Teh, Je Sen</au><au>Samsudin, Azman</au><au>Caballero-Gil, Pino</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Chaos-Based Authenticated Cipher with Associated Data</atitle><jtitle>Security and communication networks</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>2017</volume><issue>2017</issue><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2017/9040518</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-9981-7958</orcidid><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2017-01, Vol.2017 (2017), p.1-15 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455786160 |
source | Wiley-Blackwell Open Access Titles; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Authentication Data encryption Design specifications Digital signatures Encryption Parameter estimation Prime numbers Random numbers Software |
title | A Chaos-Based Authenticated Cipher with Associated Data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T17%3A49%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Chaos-Based%20Authenticated%20Cipher%20with%20Associated%20Data&rft.jtitle=Security%20and%20communication%20networks&rft.au=Teh,%20Je%20Sen&rft.date=2017-01-01&rft.volume=2017&rft.issue=2017&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2017/9040518&rft_dat=%3Cproquest_cross%3E2455786160%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455786160&rft_id=info:pmid/&rfr_iscdi=true |