Real-Time Secure Multimedia Communication System Based on Chaos Theory

We propose a novel block-based symmetric encryption system based on an n-array of independently iterated chaotic logistic maps with global and local feedback as a diffusion process. Local feedback represents the temporal evolution of a single map, while g

  • PDF / 215,726 Bytes
  • 5 Pages / 430 x 660 pts Page_size
  • 2 Downloads / 257 Views

DOWNLOAD

REPORT


bstract. We propose a novel block-based symmetric encryption system based on an n-array of independently iterated chaotic logistic maps with global and local feedback as a diffusion process. Local feedback represents the temporal evolution of a single map, while global feedback represents the temporal evolution of the whole system (cross-map evolution). For security, the cryptosystem periodically modifies its internal configuration using a three-level random perturbation scheme, one at system-key (reset operation) and two at map array level (to increase the chaotic cycle length of the system). An analysis of the proposed scheme regarding its vulnerability to attacks, statistical properties and implementation performance is presented. To the best of our knowledge we provide a simple and secure scheme with the fastest software implementation reported in the literature. Keywords: Discrete chaotic encryption, Block ciphers, symmetric encryption.

1 Introduction Building secure multimedia communications demand new challenges difficult to handle by currently adopted encryption schemes (DES, RSA, AES, and IDEA) [1, 2]. Multimedia requires the processing of huge amounts of information at speeds going from Kilobits/sec (Kbs) to the order of Megabits/sec (Mbs), in particular those applications involving real-time audio and video transmission. Discrete chaotic dynamical systems (DCS) have been used since late 80’s, but few proposals have emerged for voice and video data encryption (with limited real-time capabilities) [36]. Considering this, we propose a novel symmetric encryption system based on an narray of independently iterated chaotic maps, along with a three-level periodic perturbation and a two-mode feedback (global and local feedback) for real-time multimedia communications. The perturbation scheme changes current system condition by modifying the system-key and the trajectory of the chaotic maps to increase system security against statistical and differential attacks. The system key is periodically modified using a random number generator, while every map trajectory is modified using the system’s output itself (ciphertext) rather than a predefined perturbation equation. Since chaotic maps are iterated independently, ciphertext interdependency is created by adding global and local feedback to current ciphertext value. H.H.S. Ip et al. (Eds.): PCM 2007, LNCS 4810, pp. 441–445, 2007. © Springer-Verlag Berlin Heidelberg 2007

442

R. Hasimoto-Beltrán and E. Mota-García

Global feedback represents the temporal evolution of the entire system, while local feedback represents the temporal evolution of a single map.

2 Proposed Chaotic Encryption Scheme Our scheme can be split into three main components: A) System-key Generation: An initial seed is first created and used for the generation of the system-key (K) using a random number generator (RNG). For security, K is constantly modified using both fixed and forced updates. Fixed key update is part of the three-level perturbation scheme in which K is replaced periodically usin