Netinfo Security ›› 2024, Vol. 24 ›› Issue (3): 385-397.doi: 10.3969/j.issn.1671-1122.2024.03.005
Previous Articles Next Articles
YANG Jiechao1, HU Hanping1,2(), SHUAI Yan1, DENG Yuxin1
Received:
2024-01-19
Online:
2024-03-10
Published:
2024-04-03
Contact:
HU Hanping
E-mail:hphu@hust.edu.cn
CLC Number:
YANG Jiechao, HU Hanping, SHUAI Yan, DENG Yuxin. Lightweight Stream Cipher Based on Time-Varying Mutual Coupling Double Chaotic System[J]. Netinfo Security, 2024, 24(3): 385-397.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.03.005
种子密钥 | 初始化变量 | 改变方式 | 改变后种子密钥 | 密钥流 改变量 | 密钥流 改变率 |
---|---|---|---|---|---|
13FB | x1 | 1→0 | 13FA | 49999460 | 49.999460% |
DE6A | x2 | 0→1 | DE6B | 50003451 | 50.003451% |
0CBD | x3 | 1→0 | 0CBC | 50005016 | 50.005016% |
9722 | x4 | 0→1 | 9723 | 49999600 | 49.999600% |
52A6 | q1 | 0→1 | 52A7 | 49998474 | 49.998474% |
8518 | q2 | 0→1 | 8519 | 49999658 | 49.999658% |
1121 | q3 | 1→0 | 1120 | 49999813 | 49.999813% |
89A0 | q4 | 0→1 | 89A1 | 49996088 | 49.996088% |
测试项 | p值 | 通过率 | 测试结果 |
---|---|---|---|
频率测试 | 0.572847 | 991/1000 | 通过 |
块内频率测试 | 0.725829 | 982/1000 | 通过 |
累计和测试 | 0.810790 | 990/1000 | 通过 |
游程测试 | 0.705466 | 990/1000 | 通过 |
块内最长游程测试 | 0.514124 | 992/1000 | 通过 |
二进制矩阵测试 | 0.357000 | 992/1000 | 通过 |
离散傅里叶变换测试 | 0.729870 | 987/1000 | 通过 |
非重叠模版匹配测试 | 0.491260 | 990/1000 | 通过 |
重叠模版匹配测试 | 0.078567 | 987/1000 | 通过 |
Maurer通用统计测试 | 0.792508 | 987/1000 | 通过 |
近似熵测试 | 0.473064 | 990/1000 | 通过 |
随机偏离测试 | 0.426830 | 616/621 | 通过 |
随机偏离变量测试 | 0.613539 | 615/621 | 通过 |
串行测试 | 0.251078 | 983/1000 | 通过 |
线性复杂度测试 | 0.761719 | 984/1000 | 通过 |
[1] |
SHANNON C E. Communication Theory of Secrecy Systems[J]. Bell Systems Technical Journal, 1949, 28(4): 656-715.
doi: 10.1002/bltj.1949.28.issue-4 URL |
[2] | JOHN A, REDDY S K M, JOSE J. Fault Resistan Trivium-Like Stream Cipher Using Higher Radii Cellular Automata[J]. Journal of Cellular Automata, 2022, 16(5-6): 463-490. |
[3] | MA Zhen, TIAN Tian, QI Wenfeng. A New Distinguishing Attack on Grain-V1 with 111 Initialization Rounds[J]. Journal of Systems Science & Complexity, 2019, 32(3): 970-984. |
[4] | ALAMER A, SOH B, BRUMBAUGH D E. MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT[J]. SYMMETRY-BASEL, 2020, 12(1): 1-21. |
[5] | ISO/IEC 29192-3: 2012(E) Information Technology-Security Techniques Lightweight Cryptography-Part 3: Stream Ciphers[S]. Switzerland: ISO, 2012. |
[6] | GUAN Jie, DING Lin, ZHANG Kai. Analysis and Design of Stream Cryptography[M]. Beijing: Science Press, 2019. |
关杰, 丁林, 张凯. 序列密码分析与设计[M]. 北京: 科学出版社, 2019. | |
[7] | ANANTHARAMAN R, SULE V. Observer Attack on Stream Ciphers[J]. Ifac Papersonline, 2022, 55(30): 13-18. |
[8] |
SINHA N. Internal State Recovery of Espresso Stream Cipher Using Conditional Sampling Resistance and Tmdto Attack[J]. Advances in Mathematics of Communications, 2021, 15(3): 539-556.
doi: 10.3934/amc.2020081 URL |
[9] |
MING Hao, HU Hanping, XIE Xuhui, et al. DCC-128: A Hardware-Oriented Lightweight Chaotic Stream Cipher[J]. Nonlinear Dyn, 2023, 111: 21995-22011.
doi: 10.1007/s11071-023-09035-z |
[10] | HAMANN M, KRAUSE M, MEIER W, et al. Design and Analysis of Small-State Grain-Like Stream Ciphers[J]. Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences, 2018, 10(5): 803-834. |
[11] | WANG Shichang, LIU Meicheng, LIN Dongdai, et al. On Grain-Like Small State Stream Ciphers against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80[J]. Computer Journal, 2023, 66(6): 1376-1399. |
[12] |
LI Tianyan, YORKE J A. Period Three Implies Chaos[J]. Amer Math Monthly, 1975, 82(10): 985-992.
doi: 10.1080/00029890.1975.11994008 URL |
[13] | DEVANEY R L. An Introduction to Chaotic Dynamical Systems[M]. New Jersey: Addison-Wesley, 1989. |
[14] |
ROBERT A, MATTHEWS J. On the Derivation of a “Chaotic” Encryption Algorithm[J]. Cryptologia, 1989, 13(1): 29-42.
doi: 10.1080/0161-118991863745 URL |
[15] | KOCAREV L. Chaos-Based Cryptograph: A Brief Overview[J]. IEEE Circuits and Systems Magazine, 2001, 1(3): 6-21. |
[16] |
BARRETO E, HUNT B R, GREBOGI C, et al. From High Dimensional Chaos to Stable Periodic Orbits: The Structure of Parameter Space[J]. Physical Review Letters, 1997, 78: 4561-4564.
doi: 10.1103/PhysRevLett.78.4561 URL |
[17] |
PAREEK N K, VINOD P, SUD K K. Image Encryption Using Chaotic Logistic Map[J]. Image and Vision Computing, 2006, 24(9): 926-934.
doi: 10.1016/j.imavis.2006.02.021 URL |
[18] | ZHONG Jin, JIANG Dong, HUANG Qiguo, et al. A Self-Updating Digital Chaotic Stream Cipher[J]. International Journal of Modern Physics C, 2018, 29(8): 1-22. |
[19] | LAHCENE M, NOUREDDINE C, LORENZ P, et al. Securing Information Using a Proposed Reliable Chaos-Based Stream Cipher: with Real-Time FPGA-Based Wireless Connection Implementation[J]. Nonlinear Dyn, 2002, 11(1): 801-830. |
[20] | ZHANG Hangming, HU Hanping, DING Weiping. Image Encryption Algorithm Based on Hilbert Sorting Vector and New Spatiotemporal Chaotic System[J]. Optics & Laser Technology, 2023, 167: 1-20. |
[21] | ZHAO Mingchao, WANG Kaihua, FU Xinchu. The Dynamical Properties of 2-D Coupled Logistic Map and Applications to Stream Cipher[J]. Communication on Applied Mathematics and Computation, 2009, 23(1): 87-92. |
[22] |
LI Ruisong, ZHAO Yu. Note on Chaos of a Coupled Lattice System Related with the Belusov-Zhabotinskii Reaction[J]. Journal of Mathematical Chemistry, 2020, 58(6): 1306-1311.
doi: 10.1007/s10910-020-01122-5 |
[23] |
JOTHI V B S, SELVARAJ S, CHINNATHAMBI V, et al. Bifurcations and Chaos in Two-Coupled Periodically Driven Four-Well Duffing-Van der Pol Oscillators[J]. Chinese Journal of Physics, 2017, 55(5): 1849-1856.
doi: 10.1016/j.cjph.2017.08.008 URL |
[24] |
AKHAVAN A, MOBARAKI A, LIM S C, et al. Pseudo Random Number Generator Based on Quantum Chaotic Map[J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(1): 101-111.
doi: 10.1016/j.cnsns.2013.06.017 URL |
[25] | GEOFFREY R G. Chaotic Dynamics-Fractals Tilings and Substitutions[M]. Cambridge: Cambridge University Press, 2017. |
[26] |
HEIDEL J. The Existence of Periodic Orbits of the Tent Map[J]. Physics Letters A, 1990, 143: 195-201.
doi: 10.1016/0375-9601(90)90738-A URL |
[27] | ARNOLD A, AVEZ A. Ergodic Problems of Classical Mechanics[M]. New Jersey: Addison-Wesley, 1967. |
[28] |
GONG Lihua, QIU Kaide, DENG Chengzhi, et al. An Image Compression and Encryption Algorithm Based on Chaotic System and Compressive Sensing[J]. Optics and Laser Technology, 2019, 115: 257-267.
doi: 10.1016/j.optlastec.2019.01.039 URL |
[29] | WANG Xingyuan, FENG Le, ZHAO Hongyu. Fast Image Encryption Algorithm Based on Parallel Computing System[J]. Journal of Information Science, 2019, 486: 340-358. |
[30] | HU Hanping, YU Rongjie, MING Hao, et al. A Coupled Chaotic System and Its Application: China, CN113190865A[P]. 2021-07-30. |
[31] | ZHENG Jun, HU Hanping. A Novel Method of Constructing High-Dimensional Digital Chaotic Systems on Finite-State Automata[J]. Chinese Physics B, 2020, 29(9): 1-11. |
[32] | FENG Dengguo. Analysis Method of Stream Cipher[M]. Beijing: Tsinghua Press, 2021. |
冯登国. 序列密码分析方法[M]. 北京: 清华大学出版社, 2021. | |
[33] | YAHYA W A, OYEWUMI K J, SEN K D. Information and Complexity Measures for the Ring-Shaped Modified Kratzer Potential[J]. India Journal of Chemistry Section A-Inorganic Bio-Inorganic Physical Theoretical & Analytical Chemisty, 2014, 53(10): 1307-1316. |
[34] | HU Yusong, JUNG C L, QIN Qipu, et al. HDVC: Deep Video Compression with Hyperprior-Based Entropy Coding[J]. IEEE Assess, 2024, 12: 17541-17551. |
[35] | ANDREW R, JUAN S, JAMES N. et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R]. USA: National Institute of Standards and Technology, Special Publication 800-22, 2010. |
[36] | ECUYER P L, SIMARD R J. Testu01: A C Library for Empirical Testing of Random Number Generators[J]. ACM Transactions on Mathematical Software, 2007, 33(4): 1-40. |
[37] |
DHANDA S S, SINGH B, JINDAL P. Lightweight Cryptography: A Solution to Secure IoT[J]. Wireless Personal Communications, 2020, 112: 1947-1980.
doi: 10.1007/s11277-020-07134-3 |
[1] | FENG Guangsheng, JIANG Shunpeng, HU Xianlang, MA Mingyu. New Research Progress on Intrusion Detection Techniques for the Internet of Things [J]. Netinfo Security, 2024, 24(2): 167-178. |
[2] | ZHAI Peng, HE Jingsha, ZHANG Yu. An Identity Authentication Method Based on SM9 and Blockchain in the IoT Environment [J]. Netinfo Security, 2024, 24(2): 179-187. |
[3] | WANG Junyan, YI Peng, JIA Hongyong, ZHANG Jianhui. IoT Terminal Risk Assessment Model Based on Improved CAE [J]. Netinfo Security, 2024, 24(1): 150-159. |
[4] | ZHANG Wei, LI Zixuan, XU Xiaoyu, HUANG Haiping. SDP-CoAP: Design of Security Enhanced CoAP Communication Framework Based on Software Defined Perimeter [J]. Netinfo Security, 2023, 23(8): 17-31. |
[5] | LI Zhihua, WANG Zhihao. IoT Device Identification Method Based on LCNN and LSTM Hybrid Structure [J]. Netinfo Security, 2023, 23(6): 43-54. |
[6] | HUAN Xintao, MIAO Kaitao, CHEN Wen, WU Changfan. A Robust Wireless Key Generation Method for IoT Devices Based on Autonomous Discarding and Calibration [J]. Netinfo Security, 2023, 23(11): 17-26. |
[7] | SONG Lihua, ZHANG Jinwei, ZHANG Shaoyong. An Adaptive IoT SSH Honeypot Strategy Based on Game Theory Opponent Modeling [J]. Netinfo Security, 2023, 23(11): 38-47. |
[8] | LIAO Liyun, ZHANG Bolei, WU Lifa. IoT Anomaly Detection Model Based on Cost-Sensitive Learning [J]. Netinfo Security, 2023, 23(11): 94-103. |
[9] | LIU Xiangyu, LU Tianliang, DU Yanhui, WANG Jingxiang. Lightweight IoT Intrusion Detection Method Based on Feature Selection [J]. Netinfo Security, 2023, 23(1): 66-72. |
[10] | ZHANG Xuewang, LIU Yufan. Identity Traceable Anonymous Authentication Scheme for Nodes in the Perception Layer of IoT [J]. Netinfo Security, 2022, 22(9): 55-62. |
[11] | HU Yujia, DAI Zhengyi, SUN Bing. Differential-Linear Cryptanalysis of the SIMON Algorithm [J]. Netinfo Security, 2022, 22(9): 63-75. |
[12] | TONG Xiaojun, SU Yuyue, ZHANG Miao, WANG Zhu. Lightweight Cipher Algorithm Based on Chaos and Improved Generalized Feistel Structure [J]. Netinfo Security, 2022, 22(8): 8-18. |
[13] | LIU Xin, LI Yunyi, WANG Miao. A Lightweight Authentication Protocol Based on Confidential Computing for Federated Learning Nodes [J]. Netinfo Security, 2022, 22(7): 37-45. |
[14] | ZHAO Hong, LI Shan, ZUO Peiliang, WEI Zhanzhen. Security Resource Allocation Method for Internet of Things Based on Reinforcement Learning [J]. Netinfo Security, 2022, 22(6): 44-52. |
[15] | HAN Li, SONG Jixiang, SUN Shimin. Moving Target Defense Mechanism Research Based on Device Address in SD-IoT [J]. Netinfo Security, 2022, 22(11): 36-46. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||