Skip to main content

A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2021)

Abstract

This paper investigates the efficiency of consolidating the stream cipher Salsa20 with chaos theory. Subsequently, an enhanced Salsa20 is presented in this paper using two kinds of chaotic maps (1D logistic map and Chebyshev map). The proposed enhanced Salsa20 (ESalsa20) algorithm is developed to be utilized as a lightweight stream cipher that can be implemented in such a way that the speed of encryption is as important as the security. This enhancement is based on the 1D logistic and Chebyshev functions. The XOR-Boolean operation is used in the chaotic layer of the propped encryption algorithm to increase the scrambling of the secret keys. Generally, histogram analysis of the ESalsa20 algorithm shows robust performance against static attacks. According to the obtained results, the ESalsa20 algorithm achieves the best values of NCC 0.3890752653, NAD 0.3689770561, and UQI 0.3777468183 as compared with the original Salsa20 algorithm. Moreover, it achieves the best values of MSE 6957.49, PSN R 9.7224, and AD 78.3394. and UQI. The proposed ESalsa20 also achieves a fast execution time than the Salsa20. As a result, adding the 1D logistic and Chebyshev functions facilitates achieving an accurate diffusion level and making the cipher faster.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gjorgjievska Perusheska, M., Dimitrova, V., Popovska-Mitrovikj, A., Andonov, S.: Application of machine learning in cryptanalysis concerning algorithms from symmetric cryptography. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 885–903. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80129-8_59

    Chapter  Google Scholar 

  2. Mahdi, M.S., Hassan, N.F.A.: Suggested super salsa stream cipher. E. Iraqi J. Comput. Inform. 44(2), 1–6 (2018)

    Article  Google Scholar 

  3. Kubba, Z.M.J., Hoomod, H.K.: A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. In: The 1st International Conference of Computer and Applied Sciences (CAS), pp. 199–203. IEEE, Baghdad (2019)

    Google Scholar 

  4. Kashinath, S.A., Mostafa, S.A., Lim, D., Mustapha, A., Hafit, H., Darman, R.: A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources. J. Intell. Syst. 30(1), 947–965 (2021)

    Article  Google Scholar 

  5. Almazrooie, M., Samsudin, A., Singh, M.M.: Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map. J. Inf. Process. Syst. 11(2), 310–324 (2015)

    Google Scholar 

  6. Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84–97. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68351-3_8

    Chapter  Google Scholar 

  7. Nugrahtama, A.L., Pramadi, Y.R.: Pramadi, implementation of Salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security. In: IOP Conference Series: Materials Science and Engineering, vol. 508, no. 1, p. 012132. IOP Publishing (2019)

    Google Scholar 

  8. Gaeini, A., Mirghadri, A., Jandaghi, G., Keshavarzi, B.: Comparing some pseudorandom number generators and cryptography algorithms using a general evaluation pattern. Int. J. Inf. Technol. Comput. Sci. 9(2), 5–31 (2016)

    Google Scholar 

  9. Zhao, Y., Zhai, F., Liang, X., Miao, S., Zhu, Y.: A lightweight secure access protocol for collecting terminals in power internet of things based on symmetric cryptographic algorithm. In: Journal of Physics: Conference Series, vol. 1920, no. 1, p. 012051. IOP Publishing (2021)

    Google Scholar 

  10. Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT0. In: 2017 International Conference on IoT and Application (ICIOT), pp. 1–4. IEEE (2017)

    Google Scholar 

  11. Sobti, R., Ganesan, G.: Analysis of quarter rounds of Salsa and ChaCha core and proposal of an alternative design to maximize diffusion. Indian J. Sci. Technol. 9(3), 1–10 (2016)

    Article  Google Scholar 

  12. Mohaisen, E.L., Mohammed, R.S.: Stream cipher based on chaotic maps. In: 1st International Conference of Computer and Applied Sciences (CAS), pp. 256–261. IEEE, Baghdad (2019)

    Google Scholar 

  13. Basha, C.B., Rajaprakash, S.: Enhancing the security using SRB18 method of embedding computing. Microprocess. Microsyst. 77, 103125 (2020)

    Article  Google Scholar 

  14. Kubba, Z.M.J., Hoomod, H.K.: Modified PRESENT Encryption algorithm based on new 5D chaotic system. In: IOP Conference Series: Materials Science and Engineering, vol. 928, no. 3, p. 032023. IOP Publishing (2020)

    Google Scholar 

  15. Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19(4), 593–598 (2017)

    Google Scholar 

  16. Yoon, E.J., Jeon, I.S.: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)

    Article  MathSciNet  Google Scholar 

  17. Aswad, F.M., Salman, I., Mostafa, S.A.: An optimization of color halftone visual cryptography scheme based on Bat algorithm. J. Intell. Syst. 30(1), 816–835 (2021)

    Article  Google Scholar 

  18. Dey, S., Sarkar, S.: Improved analysis for reduced round Salsa and Chacha. Discret. Appl. Math. 227, 58–69 (2017)

    Article  MathSciNet  Google Scholar 

  19. Fadel, A.H., Hameed, R.S., Hasoon, J.N., Mostafa, S.A., Khalaf, B.A.: A Lightweight ESalsa20 Ciphering based on 1D Logistic and Chebyshev chaotic maps. Solid State Technol. 63(1), 704–717 (2020)

    Google Scholar 

  20. Ibtisam, A.T., Hameed, S.M.: A new Color image Encryption based on multi Chaotic Maps. Iraqi J. Sci. 59(4), 2117–2127 (2018)

    Google Scholar 

  21. Khalaf, B.A., et al.: An adaptive protection of flooding attacks model for complex network environments. Secur. Commun. Netw. 2021, 1–17 (2021)

    Article  Google Scholar 

  22. Babatunde, O.S., Ahmad, A.R., Mostafa, S.A.: A smart network intrusion detection system based on network data analyzer and support vector machine. Int. J. Emerg. Trends Eng. Res. 8(1), 213–220 (2020)

    Article  Google Scholar 

  23. Mostafa, S.A., Mustapha, A., Shamala, P., Obaid, O.I., Khalaf, B.A.: Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia. Bull. Electr. Eng. Inform, 9(2), 827–833 (2020)

    Article  Google Scholar 

  24. Ismael, H.A., Abbas, J.M., Mostafa, S.A., Fadel, A.H.: An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain. Bulletin of Electrical Engineering and Informatics 10(1), 337–343 (2021)

    Article  Google Scholar 

Download references

Acknowledgment

This paper is supported by the Center of Intelligent and Autonomous Systems (CIAS), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia (UTHM).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salama A. Mostafa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hasoon, J.N., Khalaf, B.A., Hameed, R.S., Mostafa, S.A., Fadil, A.H. (2021). A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8059-5_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8058-8

  • Online ISBN: 978-981-16-8059-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics