skip to main content
10.1145/2905055.2905281acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Implementation of Hardware Efficient Chaotic Generators for Signal Security in Portable Systems

Authors Info & Claims
Published:04 March 2016Publication History

ABSTRACT

In this paper, implementation of chaotic sequence generators on Field Programmable Gate Array (FPGA) devices are presented. The chaotic sequence generators designed here are based on two different chaotic map functions The Logistic Map and the Tent Map functions. Many properties of these chaotic sequences are similar to pseudorandom sequences (pn-sequences), used for cryptography and hence it can also be used for encrypting the signals and data, for security purposes. A novel representation of floating-point number and a balanced architecture for hardware design have facilitated in reduction of hardware and power consumption. The chaotic generator designed here, consume less power and have better speed and the hardware usage is less than similar work. Maximum frequency of operation for the system designed in this work are 35.442 MHz and 26.134MHz for Tent map based and Logistic map based system respectively The randomness of the sequence generated by the chaotic generators is analyzed.by NIST test suit, to test for its randomness.

References

  1. Adriana Vlad, Azeem Ilyas and Luca Adrian, 2013. Unifying running-key approach and logistic map to generate enciphering sequences, Ann. Telecommun. (2013) 68:179--186.Google ScholarGoogle Scholar
  2. Amault Francois and Berger Thierry P., 2005 Design and Properties of a New Pseudorandom Generator Based on Filtered FCSR Automation, Ieee Transaction on Computer, Vol. 54, No. 11, pp. 1374--1383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Azzaz M. S., Tanougast C., Sadoudi S. and Dandache A., 2011. New Hardware cryptosystem bases chaos for the secure real-time of embedded applications, Workshop on Signal Processing Systems 2011, pp. 251254.Google ScholarGoogle Scholar
  4. Chin-Feng Lin, 2013. Chaos-Based 2D Visual Encryption Mechanism for ECG Medical Signal, Horizon in Computer Science Research, Vol. 4, Chapter 11, ISBN 978-1-61324-262-9.Google ScholarGoogle Scholar
  5. Ching-Kun Chen and Chun-Liang Lin, 2010. 'Text encryption using ECG signals with Chaotic Logistic Map', Proceedings 5th IEEE Conference on Industrial Electronics and Applications, pp. 1741--1746.Google ScholarGoogle ScholarCross RefCross Ref
  6. Deergha K. Rao and Ch. Gangadhar, 2011. VLSI Realization of a secure cryptosystem for Image encryption and decryption, International Conference on Signal Processing 2011, pp. 543--547.Google ScholarGoogle Scholar
  7. Elwakil A. S. and Kennedy M. P. 2000. Improved Implimentation of Chua's Chaotic Oscillator Using Current Feedback Op Amp, IEEE Transaction on Circuits and Systems, Part I, Vol. 47, No. 1, pp. 76--79.Google ScholarGoogle Scholar
  8. Farooq Omar and Datta Sekharjit, 2006. Signal-Dependent Chaotic-State-Modulated Digital Secure Communication, ETRI Journal, vol. 28, no. 2, pp. 250--252.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kennedy M. P., 1993. Three steps to Chaos -- Part I: Evolution, part II: a Chua circuit primer, IEEE transaction on Circuits and systems -- i: Fundamental Theory and Applications, Vol. 40, pp. 640--674.Google ScholarGoogle Scholar
  10. Khanzadi Himan, Eshghi Mohammad and Borujeni Shahram Etmadi, 2013., Design and FPGA Implimentation of a Pseudo Random Bit Generator Using Chaotic Maps, IETE Journal of Research, Vol. 59, No. 1, pp. 63--73Google ScholarGoogle ScholarCross RefCross Ref
  11. Linhua Zhang, Xiaofeng Liao and Xuebing Wang, 2005. An image encryption approach based on chaotic maps, Science Direct, Elsevier, Chaos, Solitons and Fractals, pp. 759--765.Google ScholarGoogle Scholar
  12. Merah Lahcene, Adda Ali-Pacha, Naima Hadj and Mustafa Mamat, 2013. A Pseudo Random Number Generator Based on the Chaotic System of Chua's Circuit, and its Real Time FPGA Implimentation, Applied Mathematical Science, Vol. 7 No. 55 pp. 2719--2734.Google ScholarGoogle Scholar
  13. Merah Lahcene, Adda Ali-Pacha, Naima Hadj and Mustafa Mamat, 2013. Design and FPGA Implimentation of Lorenz Chaotic System for Information Security Issues, Applied Mathematical Science, Vol. 7 No. 5 pp. 237--246.Google ScholarGoogle Scholar
  14. Nejati Hamid, Beirami Ahmad, and Ali H. Warsame, 2012. Discrete Time Chaotic-Map Truly Random Number Generators Design, Implementation and Variability Analysis of the Zigzag Map, Journals of Analog and Integrated Circuit and Signal processing Springer, Vol. 73, pp. 363--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Parveen S, Prashar S and Izharuddin, 2011. Technique for providing security in medical signals IMPACT, IEEE proceedings of international conference on Multimedia, Signal processing and communication Technology, pp. 68--71.Google ScholarGoogle Scholar
  16. Razzaq Abdul, Mahmood Yasir, Ahmad Farooq and Hur Ali, 2012. Strong Key Mechanism generated by LFSR based Vigenera Cipher, Proceedings of 13th International Arab Conference on Information Technology ACIT2012, pp. 544--548.Google ScholarGoogle Scholar
  17. Richard A. Guinee and Marta Blaszczyk, 2009. A Novel True Random Binary Sequence Generator Based On Chaotc Double Scroll Oscillator Combination With A Pseudo Random Generator For Cryptographic Applications, Proceedings of IEEE International conference for Internet Technology and Secure Transaction, ICITST, pp. 1--6.Google ScholarGoogle Scholar
  18. Sadoudi Said, Salah Mohamed Azzaz, Djeddou Mustapha and Benssalah Mustapah, 2009. An FPGA based Real-time Implementation of the Chen's Chaotic System for Securing Chaotic Communications "International Journal of Nonlinear Science," Vol. 7, No. 4 pp. 467--474.Google ScholarGoogle Scholar
  19. Shiguo Lian, Xi Chen, Yuan Dong and Haila Wang, 2010. On the Secure Multimedia Distribution Scheme Based on Partial Encryption, Proceedings of International Conference on Communications IEEE, pp. 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  20. Stojanovski T. and Kocarev L. 2001 Chaos based random number generators Part I: Analysis, IEEE Trans. Circuits Syst. I, vol. 48, pp. 281--288, Mar. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  21. Sufi F, Han F, Khalil I, and Hu J, 2011. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications, Security Communication Networks Wiley InterScience Published online, DOI: 10.1002/sec.226, Vol. 4, Issue 6, pp. 515--524.Google ScholarGoogle Scholar
  22. Sukalyan Soma and Sayani Senb, 2013. A Non-adaptive Partial Encryption of Grayscale Images Based on Chaos, Proceeding of first International Conference on Computational Intelligence: Modelling, Techniques and Applications (CIMTA-2013), pp. 663--671.Google ScholarGoogle Scholar
  23. Taiki Yamazaki and Atsushi Uchida, 2013. Performance of Random Number Generators Using Noise-Based Superluminescent Diode and Chaos Based Semiconductor Laser, IEEE Journal of Selected Topics in Quantum Electronics, Vol. 19, No. 4Google ScholarGoogle ScholarCross RefCross Ref
  24. Yalcin M. E., Suykens J. A. K. and Vandewalle J., 2004. True random bit generation from a double-scroll attractor, IEEE transaction on circuit and systems -- I, Vol. 51, No. 7.Google ScholarGoogle Scholar
  1. Implementation of Hardware Efficient Chaotic Generators for Signal Security in Portable Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 March 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate97of270submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader