Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023-10, Vol.82 (24), p.37097-37130
Hauptverfasser: Amdouni, Rim, Gafsi, Mohamed, Abbassi, Nessrine, Hajjaji, Mohamed Ali, Mtibaa, Abdellatif
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 37130
container_issue 24
container_start_page 37097
container_title Multimedia tools and applications
container_volume 82
creator Amdouni, Rim
Gafsi, Mohamed
Abbassi, Nessrine
Hajjaji, Mohamed Ali
Mtibaa, Abdellatif
description Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-resource cryptographic systems is required. This article presents an FPGA implementation of a block-cipher image encryption scheme based on different three-dimensional chaotic systems and genetic operations. Our approach is to define a novel approach to block-cipher hardware systems while basing it on the biological characteristics of DNA and chaos. Firstly, a robust chaos-based PRNG based on four 3D chaotic maps is proposed to create high-quality keys. The generated key sequences validate with no fail the NIST SP 800–22 test suite. Furthermore, some biological operations are added in the encryption process such as DNA biological algebraic operations to strengthen the confusion process and improve the complexity of the generated keys. Verily, a very secure block-cipher method is created to perform encryption and decryption of different images. The cryptosystem is implemented and evaluated on a Xilinx ZedBoard Zynq Evaluation and Development Kit platform. The proposed hardware architecture is capable of securing different sizes of gray-scale, medical and RGB color images. As a result, a new hardware architecture is implemented that accomplishes numerical image confusion and diffusion with a good frequency of 194.906 MHz and high throughput of 49,895,936 Mbps. Furthermore, the simulation results show that the encryption system is capable of higher security against cryptographic attacks. The entropy has reached a new high of 7.9998. A comparative study of the suggested algorithm with various new encryption methods shows that our system produces good results and provides better solutions than the state-of-the-art designs.
doi_str_mv 10.1007/s11042-023-15027-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2871977894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2871977894</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-e9ea64d2089da6fab7863f4ab2e0c0e268c818944ac4a697aac27a17b7363a2c3</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17lMUvWBBEz2GSTrddu01Nuoj_3rgVvHmagXned-Ah5FLwa8G5volC8EwyLhUTOZeaqSOyELlWTGspjtOuSs50zsUpOYtxy7kocpktyPbF232caAuh_oSAtNuNPe5wmGDq_EB9Q4Ha3rt35rqxxUCja9OdWohY00S4FnykMNTUdr73m85BT6HfoA3QOepHDIeqeE5OGugjXvzOJXm7v3tdPbL188PT6nbNnBLVxLBCKLJa8rKqoWjA6rJQTQZWInccZVG6UpRVloHLoKg0gJMahLZaFQqkU0tyNfeOwX_sMU5m6_dhSC-NLLWotE7pRMmZcsHHGLAxY-h2EL6M4ObHqZmdmuTUHJwalUJqDsUEDxsMf9X_pL4Bsuh7DA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2871977894</pqid></control><display><type>article</type><title>Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations</title><source>SpringerLink Journals - AutoHoldings</source><creator>Amdouni, Rim ; Gafsi, Mohamed ; Abbassi, Nessrine ; Hajjaji, Mohamed Ali ; Mtibaa, Abdellatif</creator><creatorcontrib>Amdouni, Rim ; Gafsi, Mohamed ; Abbassi, Nessrine ; Hajjaji, Mohamed Ali ; Mtibaa, Abdellatif</creatorcontrib><description>Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-resource cryptographic systems is required. This article presents an FPGA implementation of a block-cipher image encryption scheme based on different three-dimensional chaotic systems and genetic operations. Our approach is to define a novel approach to block-cipher hardware systems while basing it on the biological characteristics of DNA and chaos. Firstly, a robust chaos-based PRNG based on four 3D chaotic maps is proposed to create high-quality keys. The generated key sequences validate with no fail the NIST SP 800–22 test suite. Furthermore, some biological operations are added in the encryption process such as DNA biological algebraic operations to strengthen the confusion process and improve the complexity of the generated keys. Verily, a very secure block-cipher method is created to perform encryption and decryption of different images. The cryptosystem is implemented and evaluated on a Xilinx ZedBoard Zynq Evaluation and Development Kit platform. The proposed hardware architecture is capable of securing different sizes of gray-scale, medical and RGB color images. As a result, a new hardware architecture is implemented that accomplishes numerical image confusion and diffusion with a good frequency of 194.906 MHz and high throughput of 49,895,936 Mbps. Furthermore, the simulation results show that the encryption system is capable of higher security against cryptographic attacks. The entropy has reached a new high of 7.9998. A comparative study of the suggested algorithm with various new encryption methods shows that our system produces good results and provides better solutions than the state-of-the-art designs.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-15027-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algebra ; Algorithms ; Biological activity ; Color imagery ; Comparative studies ; Computer architecture ; Computer Communication Networks ; Computer Science ; Computer systems ; Confusion ; Cryptography ; Data encryption ; Data Structures and Information Theory ; Deoxyribonucleic acid ; DNA ; Encryption ; Energy consumption ; Hardware ; Internet ; Multimedia ; Multimedia Information Systems ; Performance evaluation ; Robustness (mathematics) ; Software ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2023-10, Vol.82 (24), p.37097-37130</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-e9ea64d2089da6fab7863f4ab2e0c0e268c818944ac4a697aac27a17b7363a2c3</citedby><cites>FETCH-LOGICAL-c319t-e9ea64d2089da6fab7863f4ab2e0c0e268c818944ac4a697aac27a17b7363a2c3</cites><orcidid>0000-0002-3623-9844</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-15027-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-15027-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27922,27923,41486,42555,51317</link.rule.ids></links><search><creatorcontrib>Amdouni, Rim</creatorcontrib><creatorcontrib>Gafsi, Mohamed</creatorcontrib><creatorcontrib>Abbassi, Nessrine</creatorcontrib><creatorcontrib>Hajjaji, Mohamed Ali</creatorcontrib><creatorcontrib>Mtibaa, Abdellatif</creatorcontrib><title>Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-resource cryptographic systems is required. This article presents an FPGA implementation of a block-cipher image encryption scheme based on different three-dimensional chaotic systems and genetic operations. Our approach is to define a novel approach to block-cipher hardware systems while basing it on the biological characteristics of DNA and chaos. Firstly, a robust chaos-based PRNG based on four 3D chaotic maps is proposed to create high-quality keys. The generated key sequences validate with no fail the NIST SP 800–22 test suite. Furthermore, some biological operations are added in the encryption process such as DNA biological algebraic operations to strengthen the confusion process and improve the complexity of the generated keys. Verily, a very secure block-cipher method is created to perform encryption and decryption of different images. The cryptosystem is implemented and evaluated on a Xilinx ZedBoard Zynq Evaluation and Development Kit platform. The proposed hardware architecture is capable of securing different sizes of gray-scale, medical and RGB color images. As a result, a new hardware architecture is implemented that accomplishes numerical image confusion and diffusion with a good frequency of 194.906 MHz and high throughput of 49,895,936 Mbps. Furthermore, the simulation results show that the encryption system is capable of higher security against cryptographic attacks. The entropy has reached a new high of 7.9998. A comparative study of the suggested algorithm with various new encryption methods shows that our system produces good results and provides better solutions than the state-of-the-art designs.</description><subject>Algebra</subject><subject>Algorithms</subject><subject>Biological activity</subject><subject>Color imagery</subject><subject>Comparative studies</subject><subject>Computer architecture</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer systems</subject><subject>Confusion</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data Structures and Information Theory</subject><subject>Deoxyribonucleic acid</subject><subject>DNA</subject><subject>Encryption</subject><subject>Energy consumption</subject><subject>Hardware</subject><subject>Internet</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Performance evaluation</subject><subject>Robustness (mathematics)</subject><subject>Software</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17lMUvWBBEz2GSTrddu01Nuoj_3rgVvHmagXned-Ah5FLwa8G5volC8EwyLhUTOZeaqSOyELlWTGspjtOuSs50zsUpOYtxy7kocpktyPbF232caAuh_oSAtNuNPe5wmGDq_EB9Q4Ha3rt35rqxxUCja9OdWohY00S4FnykMNTUdr73m85BT6HfoA3QOepHDIeqeE5OGugjXvzOJXm7v3tdPbL188PT6nbNnBLVxLBCKLJa8rKqoWjA6rJQTQZWInccZVG6UpRVloHLoKg0gJMahLZaFQqkU0tyNfeOwX_sMU5m6_dhSC-NLLWotE7pRMmZcsHHGLAxY-h2EL6M4ObHqZmdmuTUHJwalUJqDsUEDxsMf9X_pL4Bsuh7DA</recordid><startdate>20231001</startdate><enddate>20231001</enddate><creator>Amdouni, Rim</creator><creator>Gafsi, Mohamed</creator><creator>Abbassi, Nessrine</creator><creator>Hajjaji, Mohamed Ali</creator><creator>Mtibaa, Abdellatif</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-3623-9844</orcidid></search><sort><creationdate>20231001</creationdate><title>Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations</title><author>Amdouni, Rim ; Gafsi, Mohamed ; Abbassi, Nessrine ; Hajjaji, Mohamed Ali ; Mtibaa, Abdellatif</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-e9ea64d2089da6fab7863f4ab2e0c0e268c818944ac4a697aac27a17b7363a2c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algebra</topic><topic>Algorithms</topic><topic>Biological activity</topic><topic>Color imagery</topic><topic>Comparative studies</topic><topic>Computer architecture</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer systems</topic><topic>Confusion</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data Structures and Information Theory</topic><topic>Deoxyribonucleic acid</topic><topic>DNA</topic><topic>Encryption</topic><topic>Energy consumption</topic><topic>Hardware</topic><topic>Internet</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Performance evaluation</topic><topic>Robustness (mathematics)</topic><topic>Software</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amdouni, Rim</creatorcontrib><creatorcontrib>Gafsi, Mohamed</creatorcontrib><creatorcontrib>Abbassi, Nessrine</creatorcontrib><creatorcontrib>Hajjaji, Mohamed Ali</creatorcontrib><creatorcontrib>Mtibaa, Abdellatif</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amdouni, Rim</au><au>Gafsi, Mohamed</au><au>Abbassi, Nessrine</au><au>Hajjaji, Mohamed Ali</au><au>Mtibaa, Abdellatif</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-10-01</date><risdate>2023</risdate><volume>82</volume><issue>24</issue><spage>37097</spage><epage>37130</epage><pages>37097-37130</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-resource cryptographic systems is required. This article presents an FPGA implementation of a block-cipher image encryption scheme based on different three-dimensional chaotic systems and genetic operations. Our approach is to define a novel approach to block-cipher hardware systems while basing it on the biological characteristics of DNA and chaos. Firstly, a robust chaos-based PRNG based on four 3D chaotic maps is proposed to create high-quality keys. The generated key sequences validate with no fail the NIST SP 800–22 test suite. Furthermore, some biological operations are added in the encryption process such as DNA biological algebraic operations to strengthen the confusion process and improve the complexity of the generated keys. Verily, a very secure block-cipher method is created to perform encryption and decryption of different images. The cryptosystem is implemented and evaluated on a Xilinx ZedBoard Zynq Evaluation and Development Kit platform. The proposed hardware architecture is capable of securing different sizes of gray-scale, medical and RGB color images. As a result, a new hardware architecture is implemented that accomplishes numerical image confusion and diffusion with a good frequency of 194.906 MHz and high throughput of 49,895,936 Mbps. Furthermore, the simulation results show that the encryption system is capable of higher security against cryptographic attacks. The entropy has reached a new high of 7.9998. A comparative study of the suggested algorithm with various new encryption methods shows that our system produces good results and provides better solutions than the state-of-the-art designs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-15027-3</doi><tpages>34</tpages><orcidid>https://orcid.org/0000-0002-3623-9844</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2023-10, Vol.82 (24), p.37097-37130
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2871977894
source SpringerLink Journals - AutoHoldings
subjects Algebra
Algorithms
Biological activity
Color imagery
Comparative studies
Computer architecture
Computer Communication Networks
Computer Science
Computer systems
Confusion
Cryptography
Data encryption
Data Structures and Information Theory
Deoxyribonucleic acid
DNA
Encryption
Energy consumption
Hardware
Internet
Multimedia
Multimedia Information Systems
Performance evaluation
Robustness (mathematics)
Software
Special Purpose and Application-Based Systems
title Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T17%3A57%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20hardware%20implementation%20of%20a%20block-cipher%20scheme%20based%20on%20chaos%20and%20biological%20algebraic%20operations&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Amdouni,%20Rim&rft.date=2023-10-01&rft.volume=82&rft.issue=24&rft.spage=37097&rft.epage=37130&rft.pages=37097-37130&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-15027-3&rft_dat=%3Cproquest_cross%3E2871977894%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2871977894&rft_id=info:pmid/&rfr_iscdi=true