2019
DOI: 10.1109/tcsi.2018.2867918
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Encryption for 10-Gb Ethernet Optical Links

Abstract: In this paper, a new physical layer encryption method for optical 10-Gb Ethernet links is proposed. Necessary modifications to introduce encryption in Ethernet 10GBase-R standard have been considered. This security enhancement has consisted of a symmetric streaming encryption of the 64b/66b data flow at physical coding sublayer level thanks to two keystream generators based on a chaotic algorithm. The overall system has been implemented and tested in a field programmable gate array. Ethernet traffic has been e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…Because the STM algorithm has a division operation that can be costly to implement in hardware but the divisors are constant for each seed, a common approach used in several works (including this one) consists of pre-calculating the divisors (1/γ and 1/(1 − γ)) and using multiplications instead [24,25]. A block diagram of the STM can be seen in Figure 2.…”
Section: Skew Tent Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…Because the STM algorithm has a division operation that can be costly to implement in hardware but the divisors are constant for each seed, a common approach used in several works (including this one) consists of pre-calculating the divisors (1/γ and 1/(1 − γ)) and using multiplications instead [24,25]. A block diagram of the STM can be seen in Figure 2.…”
Section: Skew Tent Mapmentioning
confidence: 99%
“…Note that, although the possibility of combining an STM with an LFSR was advanced in [23,25], in this work the encryption algorithm was optimized using 8 bits of the LFSR after each iteration step, achieving better statistical properties while obtaining higher encryption speeds, as will be shown in the next sections. Furthermore, this paper presents an ASIC implementation of the system as well as experimental results and a comprehensive cryptanalysis.…”
Section: Encryption Algorithmmentioning
confidence: 99%
“…Regarding the physical layer security in these standards, a new mechanism was proposed in [18]. The encryption solution consisted of a symmetric chaotic stream cipher, suitable for the encryption of 64b/66b blocks.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed a stream cipher application can be implemented easily thanks to a secure block cipher such as AES working in CTR mode, considered secure thanks to its formal security proof [20]. Furthermore, in [18] the implemented stream cipher is based on a chaotic structure whose cryptanalysis could be not clear enough and it is mainly based on its randomness analysis.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation