1. Introduction
As we increasingly rely on intelligent and interconnected devices in every aspect of our lives (residences, transports, hospitals, factories, …), how do we protect potentially billions of these connected devices from passive and active attacks that could compromise personal privacy or threaten public safety? We all live today in a cyber world. For that, most of the world’s web traffic (digital multimedia content such as images and videos, emails) is encrypted because of security threats.
The revised eSTREAM project, September 2008, contains seven stream ciphers that fall into two profiles. Profile 1 contains HC-128, Rabbit, Salsa20/12, and SOSEMANUK stream ciphers, which are best suited for software applications requiring high throughput. Profile 2 contains Grain, MICKEY 2.0, and Trivium stream ciphers, which are particularly suitable for hardware applications with constrained resources and limited power consumption [
1,
2]. However, these days, most of these stream ciphers are weak against various attacks and then can’t be used to secure exchanged and stored data [
3]. Likewise, 5G Security uses the NEA3-128 algorithm for privacy and the NIA3-128 algorithm for integrity. Both NEA3-128 and NIA3-128 are based on ZUC stream cipher [
4]. However, many published researchers [
5,
6] noticed that there are some weaknesses and vulnerabilities in the ZUC algorithm for differential power analysis attacks (SCA), Chosen IV attacks, etc.
For this, we use chaos-based stream ciphers, which are very secure against cryptographic attacks because chaotic signals are intrinsically secure and have high nonlinearity [
7]. The security of a stream cipher relies heavily on the pseudo-random number generator (PRNG), which acts as the primary component in the system.
There has been a development of various cryptosystems in recent years that employ chaotic systems and maps, including those for the generation of pseudo-random numbers and encryption. Some of them have issues with security or poor computational performance [
8,
9,
10,
11,
12,
13,
14,
15,
16]. Moreover, some of these cryptosystems are not well-suited for use on smart devices with limited resources, such as low memory, limited processing capabilities, and energy efficiency issues [
17,
18,
19].
Devices used in the Internet of Things are low-power and resource constrained, so for these devices, hardware implementation of cryptosystems is more suitable than the software implementation. It is noteworthy that currently, there are only a limited number of chaotic systems that have been implemented on Field-Programmable Gate Array (FPGA) boards [
20,
21,
22,
23,
24]. FPGAs are used for various reasons, including Speed (FPGAs can perform certain operations much faster than microprocessors), customizability, power efficiency, flexibility, and parallelism. A new lightweight chaos-based stream cipher, using two nonlinear feedback shift registers (NLFSR), was proposed by Ding et al. [
25] in 2019. The results obtained indicate the good cryptographic characteristics of their stream cipher. To provide security in multimedia applications dealing with high voluminous data, several effective chaos-based encryption systems using four combined chaotic maps (Logistic, Arnold, Lorenz, and Chebyshev) published by Abdelfatah et al. [
26] in 2020 and a novel medical image encryption system based on the Logistic-Tent map, Arnold’s scrambling, and a special nonlinear function based LFSR was proposed by Subhrajyoti et al. [
27] in 2021. Experimental works reveal that the proposed cryptosystems have good prospects for real-time image encryption. In 2022, Jun et al. [
28] developed a highly secure stream cipher based on the analog–digital hybrid chaotic system consisting of the Chen chaotic system and a modified three-dimensional Logistic map. The proposed stream cipher has the advantages of huge key space, virtually infinite cycle length, and tight security.
We propose in this research work to design, and implement on an FPGA board, three chaos-based stream ciphers and evaluate their performance, in terms of security against statistical attacks, and cryptographic attacks, as well as in terms of hardware metrics, including throughput and efficiency. The proposed solutions cope with the trade-offs between security, performance, and cost, and have a better level of security compared to standard methods (thanks to the high non-linearity of chaotic systems).
The remainder of this article is organized as follows: In
Section 2, we introduce, implement, and evaluate the statistical and hardware performance of some discrete chaotic maps used here, specifically Logistic, Skew-Tent (STM), PWLCM, 3D-Chebyshev (3D-Ch), and a Linear Feedback Shift Register (LFSR) as the basis for the chaos-based stream ciphers design proposed in this work. Based on the performance results of the studied chaotic maps, we designed, implemented, and analyzed in
Section 3 three-stream encryption methods that utilize three secure pseudo-chaotic number generators (PRNGs-CS), known as LSP-PRNG, LST-PRNG, and LSPT-PRNG, by combining different chaotic maps such as the Logistic map, STM, PWLCM, and 3D-Ch map. Then, we present the results of the experiments in terms of security evaluation and hardware metrics of the proposed PRNGs-CS and their corresponding stream ciphers. Finally,
Section 4 summarizes the whole article.
Notice that, for the proposed chaotic systems, in all statistical experiments, 100 random secret keys are utilized to produce 100 different sequences of 3,125,100 32-bit samples. However, just 3,125,000 samples were utilized per sequence (i.e., bits). While the system internally generates the first 100 samples per sequence for each key, they are not employed to deviate from the transitional phase.
2. Study of Used Discrete Chaotic Maps: Statistical Test and Hardware Metrics
In information security, chaotic maps are used in stream ciphers [
7,
29], block ciphers [
30,
31], hashing [
32], steganography, and digital watermarking [
33,
34]. They can replace traditional pseudo-random number generators such as maximum length PN sequences, and Gold and Kasami generators. However, the use of these chaotic maps alone in practical data security applications is not secure, as we will see in this paragraph.
In the following, we first consider the discrete equations of the 1-D chaotic maps used (we also give the original equations of these chaotic maps in
Appendix A): Logistic, Skew-Tent, PWLCM, and the 3D-Chebyshev map and the primitive polynomial expression of an LFSR of 32-bit. Then we present the statistical security performance (in terms of NIST test, histogram, and Chi-square test) and hardware metrics of these chaotic maps, the 32-bit LFSR, and also for the 3D-Chebyshev chaotic map coupled with the 32-bit LSFR used. The results of these statistical tests indicate the degree of randomness of the generated sequences.
2.1. Discrete Equations of the Chaotic Maps and the 32-Bit LFSR Used
We give below the discrete equations of the chaotic maps, and the 32-bit LFSR used to design the proposed chaotic systems:
Discrete Logistic map
The logistic map, created by Pierre Verhulst in 1845, was initially designed as a model for population growth [
35]. Due to the recurrence equation’s simplicity, Ulam and Von Neumann in 1947 used the logistic map as a pseudo-random number generator [
36]. Since then, it has been widely used in cryptographic applications. When the control parameter value is set to 4, the discrete Logistic map equation is as follows:
where
is an integer that falls within the range
with
as the precision used and
(
Floor function) returns the highest integer that is less than or equal to
Z.
Discrete Skew-Tent map
The Skew-Tent map is a piecewise linear map, the equation of the discretized Skew-Tent map is defined by:
where
is an integer that falls within the range
and
is the Skew-Tent map’s control parameter, with a value in the range
.
Discrete PWLCM map
Another piecewise linear chaotic map is the Piecewise Linear Chaotic Maps (PWLCM); due to its good cryptographic characteristics, compared to the other chaotic maps studied in this section, the PWLCM map is commonly employed in data encryption. The discrete PWLCM map’s equation is as follows:
where
is the PWLCM map’s control parameter, with a value in the range
and
belongs to the same interval as
and
.
Discrete 3D-Chebyshev map
The discrete 3D-Chebyshev (third order) map is given by:
where
.
32-bit LFSR based on primitive polynomial with internal feedback (Galois implementation)
The 32-bit LFSR with maximum length feedback used in our work is defined by the following primitive polynomial:
Its circuit diagram is shown in
Figure 1. The sequences generated (random outputs) are periodic of period equal to
− 1 = 4,294,967,295.
2.2. Statistical Performance: NIST, Histogram, and Chi-Square Test
NIST statistical test
The NIST test is widely considered one of the most effective standards for evaluating the randomness of binary data [
37]. This test is a statistical package consisting of 188 proposed tests and sub-tests (15 different tests in total) for evaluating the randomness of binary sequences of arbitrary length. These tests focus on different kinds of non-randomness that can be present in sequences. A
p-value is calculated for each test to show the results of the test. A
p-value
indicates that the sequence was considered random with 99% confidence. A
p-value
implies the conclusion that the sequence is not random with 99% confidence.
Histogram and Chi-square test analysis
Another key property of any robust pseudo-chaotic number generator is to provide a uniform distribution in the whole phase space. To assert the uniformity of generated sequences, it is necessary to apply on them the chi-square test
given by the following formula:
where
represents the number of classes,
represents the number of calculated samples in the
class
, where the class
is the expected number of samples of a uniform distribution, which is equal to
.
To confirm the uniformity of a produced sequence, the experimental chi-square value must be smaller than the theoretical value . Furthermore, if the experimental chi-square value is less than the theoretical one, the resulting sequence is more uniform.
At the top of
Figure 2a–f, from left to right, we present the proportion achieved versus the test for the discrete Logistic map, Skew-Tent map, PWLCM, 3D-Chebyshev map, 32-bit LFSR, and 3D-Chebyshev map coupled with a 32-bit LFSR respectively (see
Figure 3). As we can see, the sequences generated by the discrete chaotic maps alone and the 32-bit LFSR do not successfully pass all NIST tests, and some are far from the acceptance criterion of a test indicated by the red line. In addition, we note that the PWLCM map outperforms the other chaotic maps studied, in terms of several tests passed. Moreover, obtained results for the generated sequences by the coupled 3D- Chebyshev map with the 32-bit LFSR show that all NIST tests, except the Block-frequency test, have passed, demonstrating that the coupled technique with the 32-bit LFSR improves the cryptographic properties of the 3D-Chebyshev map (this is true for any type of chaotic map).
At the bottom of
Figure 2g–l, we give the corresponding histogram for each chaotic map, the 32-bit LFSR, and the coupled 3D-Chebyshev map with the 32-bit LFSR. We notice that, visually, the histograms obtained by the chaotic maps are not uniform, except for the 32-bit LFSR and the discrete 3D-Chebyshev coupled with the 32-bit LFSR. This observation is asserted by the obtained experimental and theoretical results of the chi-square tests given in
Table 1.
2.3. Hardware Metrics
We interpret the implementation of the chaotic maps in regard to the resources utilized (area, DSPs), the speed (WNSi, Max. Freq., throughput), and the efficiency (throughput-to-slices ratio). Furthermore, we give the power consumption.
where
is the target clock period (ns) used during the implementation run “
i” and
is the Worst Negative Slack (ns) of the target clock used during the implementation run “
i” and must be positive, and very close to zero.
The data Throughput is calculated by Equation (
8).
The Efficiency is calculated by using Equation (
9).
The chaotic systems implementation was carried out on the Xilinx-manufactured PYNQ-Z2 FPGA board. To implement the chaotic systems, the code was written in VHDL using 32-bit fixed-point data format, then synthesized and implemented using Xilinx Vivado design suite (V.2017.2). The Vivado design suite tools are a set of tools provided by Xilinx for designing and implementing digital circuits on FPGA boards. These tools enable the complete design flow from creating the RTL design, to implementation, synthesis, and programming of the FPGA. The Vivado design suite includes a powerful integrated development environment (IDE) that allows users to easily design, debug, and test their designs. It also includes various features such as timing analysis, power analysis, and design exploration, which can help in fine-tuning the design for optimal performance and power consumption. As illustrated in
Figure 4, we present a summary of the various stages of the conception flow that were executed using Vivado for evaluating the metrics of the discrete Skew-Tent map as an example of demonstration. Note that the same steps for all studied chaotic systems were repeated since Design entry up to configuration bitstream generation.
The areas of the implementations of the chaotic systems on FPGA are compared using slices, Flip-Flops (FFs), and lookup tables (LUTs), which are the basic logic block of Xilinx FPGAs. Latency, maximum frequency, and throughput together determine execution speed. The efficiency parameter represents the throughput-to-slices ratio and provides a general understanding of the implementation’s hardware performance as measured by the hardware metrics.
All designs have been tested after place and route using simulation to ensure the correct functionality and produce one sample at each clock cycle.
At the end of the Place & Route process, we get the hardware metrics of chaotic systems implemented on the PYNQ-Z2 FPGA chip.
Table 2, resume the obtained hardware metrics of studied chaotic maps, the 32-bit LFSR, and the 3D-Chebyshev map coupled with the 32-bit LFSR.
In terms of computing performance, the PWLCM is slower when compared to other chaotic maps and uses approximately three times more hardware resources than the Skew-Tent map. Moreover, the obtained values for the discrete Logistic map show that a high throughput characterizes the Logistic map compared to the throughput of the other studied chaotic maps and uses fewer hardware resources. Furthermore, the 3D-Chebyshev map coupled with the 32-bit LFSR achieves a throughput of approximately 1.5 Gbps.
3. Proposed Chaos-Based Stream Ciphers Based on Secure PRNGs of Chaotic Sequences
Based on statistical results obtained in the previous
Section 2, we can confirm that chaotic maps cannot be used alone as a secure PRNG-CS. The question is how to combine some of them to build PRNGs-CS secure against statistical and cryptanalytic attacks, and efficient, in terms of hardware cost, throughput, and efficiency. A compromise between security and effectiveness is usually made, and it is first about the degree of security required for a given application.
In this section, we created three secure pseudorandom number generators (PRNGs), known as LSP-PRNG, LST-PRNG, and LSPT-PRNG, by combining different mathematical maps such as the Logistic map, Skew-Tent map, PWLCM map, and 3D-Chebyshev map. We also examined the stream cipher systems associated with each PRNG.
3.1. Block Diagram of Stream Ciphers Based on Secure PRNGs-CS
Figure 5 depicts a stream encryption/decryption system’s block diagram. The stream cipher method uses the XOR function for both encryption and decryption, by combining the keystream with the plaintext for encryption and with the ciphertext for decryption.
The security of such a system relies entirely on the PRNG-CS keystream. An encryption/decryption system is considered unconditionally secure when the keystream is perfectly random and the period is infinite (a so-called one-time pad).
PRNG-CS takes as input a secret key (K) and an initial value (IV) utilized to defeat a known plaintext attack. The IV changes with each new session and can only be used once. Therefore, generated sequences in different sessions using the same secret key will differ. Note that stream ciphers are used to continuously cipher data, such as selective video encryption or network communications. Below we will describe the proposed secure PRNGs-CS in detail.
3.2. Architectures Description of the Proposed PRNGs-CS
All the proposed secure PRNGs-CS have the same general design, though different internal states and just slightly different output functions. In this section, we describe in detail the architectures of the proposed secure PRNGs-CS and perform their security analysis and hardware metrics.
3.2.1. The Proposed LSP-PRNG
Figure 6 shows the architecture of the proposed LSP-PRNG. Its internal state is formed by three weakly coupled discrete chaotic maps: Logistic map, Skew-Tent, and Piecewise Linear Chaotic Map (PWLCM). The output function is based on chaotic multiplexing techniques.
The proposed LSP-PRNG takes a secret key
K and an initialization vector
as input and computes initial values
,
and
of the three chaotic maps: Logistic, Skew-Tent, and PWLCM respectively. The
of the system supplies the initial vectors of the three chaotic maps:
,
, and
each are of size N = 32 bits, and the secret key
K provides all the initial conditions and parameters of the chaotic maps and the parameters of the coupling matrix M, as summarized in
Table 3.
The size of the secret key, noted
, of the proposed LSP-PRNG is given by
(see below the form of the Matrix M containing ) where , , and .
The key space of the secret key is
different combinations which are large enough to make the brute-force attack infeasible [
38]. Indeed, it is commonly agreed upon that a key space of at least
is required to make the brute-force attack infeasible.
The secret key K provides initial conditions and parameters for chaotic maps as follows:
The initial values
,
, and
of the three chaotic maps are calculated as follows:
where:
and
The function that controls the internal state creates a loose connection between the chaotic maps, generating future samples of
,
, and
. The output sequence
is then created by applying a chaotic switching method to these samples (see
Figure 6).
This equation describes how the coupling system works:
where:
with
are the weakly coupling parameters, and
;
;
.
, , and are denoted as the maps output values at instant n of the: Logistic, Skew-Tent, and PWLCM map, respectively, defined as follows:
The first three outputs of the matrix M,
are given by the following equation:
with:
Then, if
, (
represents the number of samples desired), the three outputs of the matrix M are governed by Equation (
15), with:
The obtained multiplexed samples of the sequence
are controlled by the chaotic sample
and a threshold
T:
where
and
.
3.2.2. The Proposed LST-PRNG
The design of the proposed LST-PRNG is given in
Figure 7. The internal state of the system is constructed by weakly coupling three discrete chaotic maps: Logistic map, STM, and 3D-Ch coupled with an LFSR. The latter can improve the 3D Chebyshev periodicity and its uniformity, as shown in
Section 2. The output function is based on modulo addition and XOR operations.
Compared with the architecture in
Figure 6, the proposed LST-PRNG architecture has better hardware performance because the hardware performance of the 3D Ch map is better than those of the PWLCM map. Moreover, using 3D Ch increases the robustness of the system against algebraic attacks.
The size of the secret key of the proposed LST-PRNG is:
where
; and
,
are the initial conditions of the 3D Ch and the Linear Feedback Shift Register (LFSR), respectively.
The key space contains different values, which is large enough to make brute-force attacks infeasible.
The initial values
,
and
of the used chaotic maps are given by:
where:
and
,
and
are provided by the initial value
as follows:
Using the output samples of
,
and
, the coupling matrix M (defined in (
16)) produces the output sequence
as shown in
Figure 7. The internal system is governed by the following equations.
with:
and
,
, and
are denoted as the maps output values at instant
n of the: Logistic, Skew-Tent, and 3D-Ch map, respectively.
The first three outputs of the matrix M,
are given by:
with:
and:
Then, for
and
, the matrix
M output is given by Equation (
29), with:
Finally the output
is calculated by (see
Figure 7):
3.2.3. The Proposed LSPT-PRNG
Some applications (military, industrial, etc.) need to sacrifice hardware metrics for maximum security. For this purpose, we propose the LSPT-PRNG architecture shown in
Figure 8. The proposed generator was studied, implemented in Matlab code, and published in [
30], but it only performs security analysis, currently focusing on hardware metrics.
3.3. Security Analysis and Hardware Metrics of the Proposed PRNGs-CS
3.3.1. PRNGs-CS Resilience against Statistical Attacks
A set of tests should be applied to assess the statistical cryptographic characteristic of the generated sequences by the proposed PRNGs-CS. Each test checks for a particular feature, such as the correlation between generated sequences or their uniformity, and the composite results of these tests give an insight into the level of randomness of the generated sequences. The statistical properties of the generated sequences are closely linked to the pseudo-chaotic behavior of these sequences. The National Institute of Standards and Technology (NIST) test, among other tests (TestU01, DieHARD), serves as a reference for quantifying and comparing the statistical effects of pseudo-random sequences.
Phase space test
We draw in
Figure 9a–c the phase space or mapping of sequences X1, X2, and X3 generated by the suggested LSP-PRNG, LST-PRNG, and LSPT-PRNG, respectively, and created by 3,125,000 samples. In
Figure 9d–f, we present the mapping of 1000 samples (a zoom) selected randomly from X1, X2, and X3, respectively.
Already, from
Figure 9d–f, The area seems chaotic, indicating a lack of association between nearby sample results.
Histogram and Chi-square tests
A fundamental characteristic of a secure PRNG-CS is that the generated sequences are equally distributed. Histograms of the produced sequences X1, X2, and X3 are shown in
Figure 10. Their uniformities are visually observed.
The chi-square test, as defined by Equation (
6), should be used to check visual uniformity results.
Table 4 shows the experimental and theoretical chi-square tests for sequences X1, X2, and X3 generated by LSP-PRNG, LST-PRNG, and LSPT-PRNG, respectively.
The experimental chi-square test values are lower than the theoretical values for all proposed PRNGs-CS, confirming the uniformity of the histograms.
NIST test
A further important effect of a secure PRNG-CS is that the generated sequences must pass the NIST statistical tests (previously defined in
Section 2). The results obtained show that the sequences generated by the proposed PRNGs-CS pass all 15 statistical tests, as shown in
Figure 11 and
Table 5.
Key sensitivity analysis (using Hamming Distance)
Key sensitivity is a critical property for PRNGs. Of course, a slight modification in the secret key should result in a significant difference in the output sequence. To prove this property, for all proposed PRNGs-CS, we compute the Hamming Distance between two sequences produced
that are just the LSB (Least Significant Bit) of parameter
different. Compute the mean Hamming Distance HD among the two generated sequences for five random secret keys.
is illustrated by the formula below:
where
is the number of bits in a produced sequence.
Table 6 illustrates the average Hamming distance values for the proposed LSP-PRNG, LST-PRNG, and LSPT-PRNG. These values are relative to the optimal value of
. This result demonstrates the high sensibility of the secret key of the proposed PRNGs-CS.
3.3.2. Hardware Metrics of the Proposed PRNGs-CS
We quantify the performance of the proposed PRNGs-CS implementation in regard to the resources utilized, the speed, the efficiency, and the power consumption.
Table 7 lists the results of our three proposed PRNGs-CS designs.
We can observe that the LST-PRNG consumes the minimum slice at 1024 slices, and the LSPT-PRNG consumes the maximum slice at 3337 slices. All proposed PRNGs-CS offer high speed. 1013.36 Mbps, 1224 Mbps, and 995.14 Mbps for LSP-PRNG, LST-PRNG, and LSPT-PRNG respectively. The LST-PRNG offers the best throughput. Additionally, the LST-PRNG architecture offers lower power consumption (83 mW) compared to LSP-PRNG and LSPT-PRNG. The LST-PRNG design is ideal for IoT applications, and its efficiency is 1.20 Mbps/Slices.
We perform below a comparison of hardware metrics with several chaotic and non-chaotic systems for various stream ciphers based on the PRNGs-CS proposed above.
3.4. Performance Analysis of Stream Ciphers Based on Proposed PRNGs-CS
In this section, we first evaluate the security of stream ciphers (SC) based on the proposed PRNGs-CS using well-known cryptanalytic analysis. We then provide hardware metrics and compare them to several released systems.
3.4.1. Cryptanalytic Analysis
To evaluate the security of the proposed chaos-based stream cipher against the most common attacks, we perform key sensitivity and statistical analysis on various encrypted images below.
Sensitivity analysis
A robust cryptosystem must also be sensitive to secret keys. In other words, a small change to the secret key will generate a completely different ciphered image. The sensitivity is typically determined by two criteria, NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) [
39]. We also apply the Hamming Distance (HD), which is measured in bits. In our view, the HD parameter is more accurate than NPCR and UACI criteria. The formulas for these parameters are given below, with
, and
being the two encrypted images of the same original image P.
where
M,
N, and
P are the width, height, and plane sizes (for a gray image,
; for an RGB color image,
) of
and
.
The NPCR calculates the proportion of distinct pixel numbers in two encrypted images.
which computes the average intensity of differences between
and
.
For a random image, the expected values of NPCR, UACI, and HD are
,
, and
, respectively. We have tested five color images with the same size
and different features as shown in
Figure 12.
Table 8 displays the NPCR, UACI, and HD values obtained for the original images of Lena, Peppers, Baboon, Barbara, and Boats. These findings show that the generated NPCR, UACI, and HD values are extremely near the optimal values. These results exhibit that the proposed chaos-based stream ciphers are highly sensitive to slight changes in the secret key.
Statistical analysis
To analyze the resilience of the proposed chaos-based stream cipher against most statistical attacks, we perform the following statistical analysis: histogram, chi-square, entropy, and correlation.
Histogram and chi-square tests
The histogram of the ciphered image plays a crucial role in determining the effectiveness of the encryption process. This indicates the pattern in which the gray levels of pixels in an encrypted image are arranged, and it should be highly similar to a uniform distribution.
Figure 13 and
Figure 14 show the results for Barbara and Boats of size 512 × 512 × 3 as an example, in (a) the plain images, (b) the cipher images by LSP-SC, (c) the cipher images by LST-SC, (d) the cipher images by LSPT-SC, and in (e–h) their histograms, respectively.
We can see that the histogram of the ciphered image is highly similar to a uniform distribution and vastly different from the original image. Using Equation (
6), we perform a chi-square test on ciphered images to establish their uniformity statistically, where here:
is the number of levels, which is equal to
.
As demonstrated in
Table 9, the chi-square test results indicate that the histograms of the encrypted images tested are distributed uniformly, as he theoretical values are higher than the experimental ones.
Entropy analysis
The randomness of the encrypted image can be quantitatively measured through the entropy information provided by Shannon [
40]:
with
represents the entropy of the ciphered image and
denotes the probability of occurrence of each gray level (
). When the probability is the same, the entropy reaches its peak value (=8). The encryption algorithm is more robust when the experimental entropy value is closer to the maximum value. The results of the entropy test on the original and ciphered images are displayed in
Table 10.
The entropies of the encrypted images are close to the optimal value; therefore, the stream cipher proposed in this study has a high level of robustness, as demonstrated by these results.
Correlation analysis
In an original image, correlation analysis can be used to measure the relationship between adjacent pixels in horizontal, vertical, and diagonal directions. This can be useful in identifying patterns and features in the image, such as edges and textures. An effective encryption process should result in ciphered images with minimal correlation and redundancy between adjacent pixels (as close to zero as possible). We carry out the following steps to evaluate the correlation: First, 8000 pairs of adjacent pixels are chosen at random from the test image, and then the correlation coefficients are calculated using the formula below.
where:
The
x and
y are grayscale values of two pixels that are close to each other in the image under test. The results achieved are presented in
Table 11.
Table 11 indicates that the correlation coefficients for the original images are almost one, demonstrating that the pixels are highly related, On the other hand, for the encrypted images, the correlation coefficients are nearly zero, indicating that there is no correlation between the original and encrypted images. As a result, there is no similarity between the original and ciphered images, which demonstrates the high level of confusion achieved by the proposed chaos-based stream ciphers.
Based on the analysis of histogram, entropy, and correlation, the proposed chaos-based stream ciphers have a high capability to defend against statistical attacks.
3.4.2. Hardware Metrics
To quantify the performance of the proposed implementation of the chaos-based stream ciphers in regard to the resources utilized (area, DSPs), the speed (Max. Freq., Throughput), the efficiency, and the power consumption, we cipher just four pixels. The proposed PRNGs-CS produce at each clock cycle a 32-bit sample, and we used the least significant 8 bits for XORing with each pixel (8 bits) to generate the corresponding encrypted pixel. Hardware metrics results for the proposed chaos-based stream ciphers are shown in
Table 12 and, as expected, are linked to results for the various proposed PRNGs-CS.
Table 13 provides an overview of the hardware metrics comparison of the chaos-based stream ciphers proposed, the ZUC cipher, and chaotic and non-chaotic systems that are part of the eSTREAM project phase 2-focus hardware profile. It is hard to make sense of this comparison due to the varying characteristics of the used FPGAs. However, considering the clock rate of the FPGA board and the efficiency achieved, this comparison can be made. Therefore, with the exception of the Trivium and ZUC ciphers, the proposed chaos-based stream ciphers have competitive hardware performance when compared to most other chaotic and non-chaotic systems. Nevertheless, since 2007, several kinds of attacks have been launched against the eSTREAM cipher and ZUC stream cipher, revealing several vulnerabilities to cryptanalysis attacks [
3,
41,
42,
43,
44].
Note: Nowadays, promising new fractional chaotic functions have appeared, which seem very robust against cryptographic attacks. We believe they deserve further study to build chaotic fractional systems for data security. The design of such fractional chaotic systems must deal with the trade-offs between safety, performance, and cost.