Abstract
This paper investigates the efficiency of consolidating the stream cipher Salsa20 with chaos theory. Subsequently, an enhanced Salsa20 is presented in this paper using two kinds of chaotic maps (1D logistic map and Chebyshev map). The proposed enhanced Salsa20 (ESalsa20) algorithm is developed to be utilized as a lightweight stream cipher that can be implemented in such a way that the speed of encryption is as important as the security. This enhancement is based on the 1D logistic and Chebyshev functions. The XOR-Boolean operation is used in the chaotic layer of the propped encryption algorithm to increase the scrambling of the secret keys. Generally, histogram analysis of the ESalsa20 algorithm shows robust performance against static attacks. According to the obtained results, the ESalsa20 algorithm achieves the best values of NCC 0.3890752653, NAD 0.3689770561, and UQI 0.3777468183 as compared with the original Salsa20 algorithm. Moreover, it achieves the best values of MSE 6957.49, PSN R 9.7224, and AD 78.3394. and UQI. The proposed ESalsa20 also achieves a fast execution time than the Salsa20. As a result, adding the 1D logistic and Chebyshev functions facilitates achieving an accurate diffusion level and making the cipher faster.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gjorgjievska Perusheska, M., Dimitrova, V., Popovska-Mitrovikj, A., Andonov, S.: Application of machine learning in cryptanalysis concerning algorithms from symmetric cryptography. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 885–903. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80129-8_59
Mahdi, M.S., Hassan, N.F.A.: Suggested super salsa stream cipher. E. Iraqi J. Comput. Inform. 44(2), 1–6 (2018)
Kubba, Z.M.J., Hoomod, H.K.: A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. In: The 1st International Conference of Computer and Applied Sciences (CAS), pp. 199–203. IEEE, Baghdad (2019)
Kashinath, S.A., Mostafa, S.A., Lim, D., Mustapha, A., Hafit, H., Darman, R.: A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources. J. Intell. Syst. 30(1), 947–965 (2021)
Almazrooie, M., Samsudin, A., Singh, M.M.: Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map. J. Inf. Process. Syst. 11(2), 310–324 (2015)
Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84–97. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68351-3_8
Nugrahtama, A.L., Pramadi, Y.R.: Pramadi, implementation of Salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security. In: IOP Conference Series: Materials Science and Engineering, vol. 508, no. 1, p. 012132. IOP Publishing (2019)
Gaeini, A., Mirghadri, A., Jandaghi, G., Keshavarzi, B.: Comparing some pseudorandom number generators and cryptography algorithms using a general evaluation pattern. Int. J. Inf. Technol. Comput. Sci. 9(2), 5–31 (2016)
Zhao, Y., Zhai, F., Liang, X., Miao, S., Zhu, Y.: A lightweight secure access protocol for collecting terminals in power internet of things based on symmetric cryptographic algorithm. In: Journal of Physics: Conference Series, vol. 1920, no. 1, p. 012051. IOP Publishing (2021)
Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT0. In: 2017 International Conference on IoT and Application (ICIOT), pp. 1–4. IEEE (2017)
Sobti, R., Ganesan, G.: Analysis of quarter rounds of Salsa and ChaCha core and proposal of an alternative design to maximize diffusion. Indian J. Sci. Technol. 9(3), 1–10 (2016)
Mohaisen, E.L., Mohammed, R.S.: Stream cipher based on chaotic maps. In: 1st International Conference of Computer and Applied Sciences (CAS), pp. 256–261. IEEE, Baghdad (2019)
Basha, C.B., Rajaprakash, S.: Enhancing the security using SRB18 method of embedding computing. Microprocess. Microsyst. 77, 103125 (2020)
Kubba, Z.M.J., Hoomod, H.K.: Modified PRESENT Encryption algorithm based on new 5D chaotic system. In: IOP Conference Series: Materials Science and Engineering, vol. 928, no. 3, p. 032023. IOP Publishing (2020)
Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19(4), 593–598 (2017)
Yoon, E.J., Jeon, I.S.: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)
Aswad, F.M., Salman, I., Mostafa, S.A.: An optimization of color halftone visual cryptography scheme based on Bat algorithm. J. Intell. Syst. 30(1), 816–835 (2021)
Dey, S., Sarkar, S.: Improved analysis for reduced round Salsa and Chacha. Discret. Appl. Math. 227, 58–69 (2017)
Fadel, A.H., Hameed, R.S., Hasoon, J.N., Mostafa, S.A., Khalaf, B.A.: A Lightweight ESalsa20 Ciphering based on 1D Logistic and Chebyshev chaotic maps. Solid State Technol. 63(1), 704–717 (2020)
Ibtisam, A.T., Hameed, S.M.: A new Color image Encryption based on multi Chaotic Maps. Iraqi J. Sci. 59(4), 2117–2127 (2018)
Khalaf, B.A., et al.: An adaptive protection of flooding attacks model for complex network environments. Secur. Commun. Netw. 2021, 1–17 (2021)
Babatunde, O.S., Ahmad, A.R., Mostafa, S.A.: A smart network intrusion detection system based on network data analyzer and support vector machine. Int. J. Emerg. Trends Eng. Res. 8(1), 213–220 (2020)
Mostafa, S.A., Mustapha, A., Shamala, P., Obaid, O.I., Khalaf, B.A.: Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia. Bull. Electr. Eng. Inform, 9(2), 827–833 (2020)
Ismael, H.A., Abbas, J.M., Mostafa, S.A., Fadel, A.H.: An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain. Bulletin of Electrical Engineering and Informatics 10(1), 337–343 (2021)
Acknowledgment
This paper is supported by the Center of Intelligent and Autonomous Systems (CIAS), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia (UTHM).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hasoon, J.N., Khalaf, B.A., Hameed, R.S., Mostafa, S.A., Fadil, A.H. (2021). A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_3
Download citation
DOI: https://doi.org/10.1007/978-981-16-8059-5_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8058-8
Online ISBN: 978-981-16-8059-5
eBook Packages: Computer ScienceComputer Science (R0)