Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0024

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map  

Almazrooie, Mishal (School of Computer Sciences, Universiti Sains Malaysia)
Samsudin, Azman (School of Computer Sciences, Universiti Sains Malaysia)
Singh, Manmeet Mahinderjit (School of Computer Sciences, Universiti Sains Malaysia)
Publication Information
Journal of Information Processing Systems / v.11, no.2, 2015 , pp. 310-324 More about this Journal
Abstract
The stream cipher Salsa20 and its reduced versions are among the fastest stream ciphers available today. However, Salsa20/7 is broken and Salsa20/12 is not as safe as before. Therefore, Salsa20 must completely perform all of the four rounds of encryption to achieve a good diffusion in order to resist the known attacks. In this paper, a new variant of Salsa20 that uses the chaos theory and that can achieve diffusion faster than the original Salsa20 is presented. The method has been tested and benchmarked with the original Salsa20 with a series of tests. Most of the tests show that the proposed chaotic Salsa of two rounds is faster than the original four rounds of Salsa20/4, but it offers the same diffusion level.
Keywords
Chaos Theory; Cryptography; Differential Attacks; Hash Function; Logistic Map; Salsa20; Stream Cipher;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 C. De Canniere, and B. Preneel, "Trivium," in New Stream Cipher Designs. Heidelberg: Springer, 2008, pp. 244-266.
2 D. J. Bernstein, "The Salsa20 family of stream ciphers," in New Stream Cipher Designs. Heidelberg: Springer, 2008, pp. 84-97.
3 P. Mukherjee, "An overview of eSTREAM ciphers," Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India, 2013.
4 P. Crowley, "Truncated differential cryptanalysis of five rounds of Salsa20," The eSTREAM Project, Technical Report 2005/073, 2005.
5 J. P. Aumasson, S. Fischer, S. Khazaei, W. Meier, and C. Rechberger, "New features of Latin dances: analysis of Salsa, ChaCha, and Rumba," in Fast Software Encryption. Heidelberg: Springer, 2008, pp. 470-488.
6 S. Fischer, W. Meier, C. Berbain, J. F. Biasse, and M. J. Robshaw, "Non-randomness in eSTREAM candidates Salsa20 and TSC-4," in Progress in Cryptology-INDOCRYPT 2006. Heidelberg: Springer, 2006, pp. 2-16.
7 I. Stewart, Does God Play Dice?: The Mathematics of Chaos, 2nd ed. Malden, MA: Blackwell, 2002.
8 R. L. Devaney, An Introduction to Chaotic Dynamical Systems, 2nd ed. Boulder, CO: Westview Press, 2003.
9 D. J. Bernstein, "Salsa20 design" 2005; http://cr.yp.to/snuffle/design.pdf.
10 R. Forre, "The Henon attractor as a keystream generator," in Abstracts of EuroCrypt'91, 1991, pp. 76-81.
11 O. P. Verma, M. Nizam, and M. Ahmad, "Modified multi-chaotic systems that are based on pixel shuffle for image encryption," Journal of Information Processing Systems, vol. 9, no. 2, pp. 271-286, 2013.   DOI   ScienceOn
12 D. R. Frey, "Chaotic digital encoding: an approach to secure communication," IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 40, no. 10, pp. 660-666, 1993.   DOI
13 A. M. N. Hasan, "Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication," in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS'09), Phoenix, AZ, 2009, pp. 918-922.
14 X. Wang, J. Zhang, and W. Zhang, "Chaotic keystream generator using coupled NDFs with parameter perturbing," in Cryptology and Network Security. Heidelberg: Springer, 2006, pp. 270-285.
15 S. Li, X. Mou, and Y. Cai, "Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography," in Progress in Cryptology: INDOCRYPT 2001. Heidelberg: Springer, 2001, pp. 316- 329.
16 R. Matthews, "On the derivation of a "chaotic" encryption algorithm," Cryptologia, vol. 13, no. 1, pp. 29-42, 1989.   DOI   ScienceOn
17 O. Goldreich and L. A. Levin, "A hard-core predicate for all one-way functions," in Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC'89), Seattle, WA, 1989, pp. 25-32.
18 A. Kanso and N. Smaoui, "Logistic chaotic maps for binary numbers generations," Chaos, Solitons & Fractals, vol. 40, no. 5, pp. 2557-2568, 2009.   DOI   ScienceOn
19 N. K. Pareek, V. Patidar, and K. K. Sud, "Discrete chaotic cryptography using external key," Physics Letters A, vol. 309, no. 1, pp. 75-82, 2003.   DOI   ScienceOn