2017
DOI: 10.3390/s17030646
|View full text |Cite
|
Sign up to set email alerts
|

Application of a MEMS-Based TRNG in a Chaotic Stream Cipher

Abstract: In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and tested in a Field Programmable Gate Array (FPGA) and was able to generate 8-bit width data streams at a clock frequency of 134 MHz, which is fast enough for Gigabit Ethernet applications. An exhaustive cryptanalysis was completed, allowing us to conclude that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 21 publications
(21 reference statements)
0
12
0
1
Order By: Relevance
“…Furthermore, it has been proven that, for all values of and , the behavior of this map is chaotic (i.e., it does not present periodic windows) [22]. Therefore, it is a very good candidate for use in chaos-based cryptosystems [23].…”
Section: Skew Tent Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, it has been proven that, for all values of and , the behavior of this map is chaotic (i.e., it does not present periodic windows) [22]. Therefore, it is a very good candidate for use in chaos-based cryptosystems [23].…”
Section: Skew Tent Mapmentioning
confidence: 99%
“…Note that, although the possibility of combining an STM with an LFSR was advanced in [23,25], in this work the encryption algorithm was optimized using 8 bits of the LFSR after each iteration step, achieving better statistical properties while obtaining higher encryption speeds, as will be shown in the next sections. Furthermore, this paper presents an ASIC implementation of the system as well as experimental results and a comprehensive cryptanalysis.…”
Section: Encryption Algorithmmentioning
confidence: 99%
“…A variant of the chaotic map called STM (Skew-Tent-Map) has been used in this work to generate the pseudorandom bitstream, used as keystream of the proposed cryptographic system. Based on previous work by our group, this chaotic map has already been theoretically studied in [21] and [22]. The hardware block diagram of the basic STM algorithm is shown in Fig.…”
Section: A Chaotic Pseudorandom Bitstream Generatormentioning
confidence: 99%
“…P SEUDORANDOM number generators (PRNG) have many applications among diverse fields such as cryptography [1], communications [2], or procedural generation [3]. Specifically, in the field of instrumentation and measurements, PRNGs are needed in many applications such as statistical sampling, Monte Carlo simulations, evaluating the immunity to noise of digital systems and, in general, testing of physical, biological, and electrical systems: code density tests and determination of Wiener and Volterra kernels in nonlinear systems [4], [5].…”
Section: Introductionmentioning
confidence: 99%