You are on page 1of 11

Nonlinear Dyn

DOI 10.1007/s11071-014-1432-z

ORIGINAL PAPER

A chaotic stream cipher based on symbolic dynamic


description and synchronization
N. W. Abderrahim · F. Z. Benmansour ·
O. Seddiki

Received: 25 September 2013 / Accepted: 21 April 2014


© Springer Science+Business Media Dordrecht 2014

Abstract In the present paper, we propose a new Keywords Cryptography · Chaos · Synchronization ·
chaos-based stream cipher, by exploiting the simplicity Pseudo-random numbers generator
of symbolic dynamic description and synchronization.
The main contribution of this work is the pseudo- 1 Introduction
random numbers generator, which is based on the
discretization of chaotic sequences generated from one- The increasing evolution of telecommunications net-
dimensional chaotic maps, satisfying uniform distrib- works has contributed significantly to the development
ution. The originality of our keystream generator lies of cryptographic mechanisms which become indis-
in the appropriate mixture of chaotic maps dynamic pensable to store and transmit data securely. This mech-
behaviors and their perturbation, in order to enhance anisms offer different security services including con-
its complexity and the secret key space, which cor- fidentiality which is maintained via encryption algo-
responds to the chaotic systems control parameters. rithms.
Thus, the pseudo-random sequences produced from There exist a variety of proposed encryption algo-
our keystream generator have adequate cryptographic rithms in the literature, some of them have been stan-
properties in terms of randomness quality, where their dardised and incorporated in different security pro-
validity is proved through NIST statistical tests. Fur- tocols. They are classified, according the encryption
thermore, the application of our keystream generator process structure, into block and stream ciphers, para-
in the proposed cryptosystem provides a satisfactory meterized by symmetric or asymmetric keys, where
security efficiency report, by insuring a good encryp- their security resides mainly in the privacy and the keys
tion effect with high resistance to known attacks, and a length. The block ciphers, such as IDEA [1] and AES
robust synchronization to noise and malicious inter- [2], are based on substitution and transposition com-
ceptions, achieved via the symbolic dynamic-based binations according to certain operative modes. They
method. achieve a high security level in comparison to stream
ciphers, which are more vulnerable to statistical and
algebraic attacks, due to the linearity and the weak
complexity of their pseudo-random numbers genera-
tors (PRNG). But on the other hand, the simple designs
N. W. Abderrahim (B) · F. Z. Benmansour · O. Seddiki · of stream ciphers (e.g., RC4 [3] and A5/1 [4]) are much
Telecommunications Laboratory of Tlemcen (LTT),
Faculty of Technology, Tlemcen University, BP. 230,
efficient and practical than block ciphers, notably for
13000 Tlemcen, Algeria applications that require a low cost encryption, like
e-mail:wa_abderrahim@mail.univ-tlemcen.dz mobile communication networks.

123
N. W. Abderrahim et al.

The need for optimal solutions has led researchers to nal, which comprises useful informations about the
find new alternatives able to improve the cryptosystems chaotic systems used in encryption process;
strength, by exploiting nonlinear phenomena, in partic- – Degradation of chaotic systems properties: syn-
ular chaos theory, which has attracted much attention in chronization robustness to initial conditions and
various real world applications. Indeed, the extensive chaotic systems parameters uncertainties reduces
studies of chaotic systems in the last decades demon- chaotic systems sensitivity to variations. This allows
strate that their dynamic behavior has attractive prop- an unauthorized receiver to synchronize and extract
erties for modern cryptography. Although this nonpe- confidential information, without prior knowledge
riodic behavior seems completely random, its evolu- of the chaotic systems parameters which are usually
tion is perfectly deterministic, so that it can be repro- considered as secret key;
duced identically in emission/reception. However, the – Low robustness to noise: the synchronization per-
chaotic systems sensitivity to slight variations causes formance of chaotic secure transmissions degrades
the so called “butterfly effect” [5], that means the unpre- rapidly in noisy environments. These transmissions
dictability of their evolution in long term. These two require generally a greater SNR compared to their
characteristics make the chaotic systems an ideal ran- traditional analogous, to maintain the same error
domness source of cryptographic quality, described by rate;
simple mathematical equations. Thus, the parameters – No compatibility of chaotic signals to current
and initial conditions defining these equations can play telecommunications infrastructure: the complex
the role of secret key, for designing new cryptosystems dynamic nature of chaotic signals requires a chan-
according to several methods in analog or digital form nel with infinite capacity, which is impossible to
[6]: additive masking, chaotic switching (chaotic shift satisfy in practice.
keying), or parametric modulation.
Unlike the conventional cryptography, which rises Consequently, the use of chaotic encryption techniques,
from discrete mathematics and algorithmic, the origi- based on such synchronization mechanisms in secure
nality of chaos encryption generation lies mainly in the transmissions that require a high confidentiality level
use of chaotic signals for data encryption in analog form and robustness, is not feasible.
directly, without a need to digitize them. This is possi- However, some works show that the discretization
ble through the chaotic synchronization mechanisms, of chaotic signals using the symbolic dynamic frame-
where various chaos synchronization techniques have work offers a new opportunities to exploit their com-
been proposed and exploited for this purpose, following plex behavior in secure transmissions [18–20], with
the primary contribution of Pecora and Carroll in 1990 a judicious synchronization in terms of noise robust-
[7–10]. Their performing consists to coupling the inter- ness and low interception probability. This simple dis-
locutors based chaotic systems (transmitter/receivers), cretization method of chaotic signals motivates the
in suitable manner by means of the synchronization sig- design of new encryption algorithms, including stream
nal, for unify their behaviors generated from different ciphers that know a standards lack.
initial conditions. In this paper we are interested in exploiting sym-
Although, the encryption techniques by chaotic sys- bolic dynamic representation of chaotic systems to cre-
tems synchronization have the advantage of being ate a new stream cipher, with original chaotic keystream
implemented using very simple telecommunication generator, based on the integration of one-dimensional
components, and the ability to achieve high throughput chaotic maps. The structure adopted for our keystream
with convenient performance for real time transmis- generator provides high security insures resistance to
sions [11–13], their safety does not match that of con- various attacks and extreme sensitivity to chaotic sys-
ventional encryption standards, as most of them have tems parameters which constitute the secret key of our
common drawbacks and share the same realisation dif- cryptosystem. The rest of the paper is organized as fol-
ficulties [14–17]: lows: the second section begins with the introduction of
chaotic maps selected for our keystream generator, and
then we explain the exploitation of symbolic dynamic
– Low confidentiality level: various attacks could be sequence dependence on initial condition to achieve
conducted by exploiting the synchronization sig- the symbolic dynamic-based method synchronization

123
Symbolic dynamic description and synchronization

(SDM). In the third section we describe the chaotic chaotically with good statistical properties, for the most
keystream generator used for the encryption/decryption parameter values in their useful intervals. They behave
process. The security analysis with simulations that chaotically in [0, 1] with critical parameters: p ≥ 2
confirm the robustness of our cryptosystem are dis- and p ∈ [1/2, 1], respectively. The chaotic sequences
cussed in the fourth section. Finally, we conclude the generated by the two maps and the simulation of their
paper in section five. states distributions are presented in Fig. 1. We can see
clearly that the histograms of the chaotic sequences
generated by the two maps satisfy uniform distribu-
2 Symbolic dynamic-based method tion. This property is very interesting for a pseudo-
synchronization random numbers generator applied to encryption. It
expresses the generator ability to provide strong con-
2.1 Preliminary fusion, required to hide clear data distribution and
redundancy. Moreover, the evaluation of their statis-
The choice of chaotic systems is crucial for crypto- tical properties, including the autocorrelation and the
graphic applications, so that it is recommended to use power spectral density (PSD) analysis [27,28], proves
good chaotic generators, with desirable statistical prop- their convenient for pseudo-random numbers gener-
erties, for safely designing cryptosystems [21]. In order ators. The symbolic description of such chaotic sys-
to optimize our cryptosystem in terms of efficacy and tems consists to convert the infinite real-valued states of
security, we have chosen to use the tow discrete chaotic chaotic orbits x1 , x2 , . . . , xn , . . . generated from (1) or
systems: Bernoulli map [22] and Skewed Tent map (2) into simple symbols sequences s1 , s2 , . . . , sn , . . .,
[23]: by partitioning phase space into regions: S = Ci ,
f (xi ) = ( p × xi ) mod 1 (1) i = 1, . . . , N that satisfy:
 xi
p if xi < p 
N
f (xi ) = 1−x (2) S= Ci and Ci ∩ C j = Φ, for i = j,
1− p if x i ≥ p
i
i=1
These one-dimensional maps belong to the family of
where each Ci is labeled with a distinct symbol,
piecewise linear markov maps (PWLM), which pos-
according to the relative position of every xi with
sess interesting features for cryptographic applications
respect to the critical state xc . In fact, the good sym-
[24–26]:
bolic dynamic description is obtained from generat-
– The chaotic sequences generated from these maps ing partition, which insures a one-to-one mapping
are very sensitive to the chaotic system parameters between every infinite real-valued state and its sym-
and initial states. This implies the uniqueness of bolic dynamic description. This unique correspondence
their dynamical evolutions, expressed by the one- lets to tracing back the initial condition value from its
to-one correspondence between the initial condi- symbolic dynamic sequence. Noting that Bernoulli and
tion and its chaotic sequence; Skew Tent maps are judicious choice for our cryptosys-
– Chaotic behaviors of these maps are preserved over tem, since their generating partitions possess only two
all useful intervals of control parameters, since their intervals, at the unique critical point which is conve-
lyapunov exponents are positive for most possible nient to the use of standard binary representation, fol-
parameters values; lowing the coding function (3).
– Their symbolic dynamic sequences are easy to gen- 
erate from the real-valued chaotic states, which 0 if xi ≤ xc
Θ(xi ) = (3)
optimize their exploitation by digital components; 1 if xi > xc
– The PWLM maps are modeled by mathematical This simple discretization method of chaotic signals,
equations based on simple arithmetic operations allows to better exploit their advantageous properties,
that are very easy to build and fast to run, on both by considering each encoded symbol si = Θ(xi ) as
software and hardware. only information bit. Hence, facilitates their integra-
Bernoulli map(1) and Skew Tent map(2) are among tion in secure digital transmissions, as a means of
the simplest kind of PWLM maps that can behave pseudo-random numbers generation, including encryp-

123
N. W. Abderrahim et al.

Fig. 1 Visualization of Bernoulli sequence Skew Tent sequence


chaotic sequences of length 1 1
106 generated by the two
maps and their states 0.8 0.8
distribution histograms,
using the same 0.6 0.6
IC = 0.372415 and
the critical parameters: 0.4 0.4
p1 = 2.9987938562 for
Bernoulli map, and 0.2 0.2
p2 = 0.6573629815 for
Skew Tent map 0 0
0 50 100 150 200 250 300 0 50 100 150 200 250 300

4 Bernoulli sequence histogram 4


x 10 x 10 Skew Tent sequence histogram
6 6

5 5

4 4

3 3

2 2

1 1

0 0
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1

tion, which needs a robust synchronization to noise and


malicious interceptions. 1

0.8
2.2 Initial condition estimation
0.6
The objective of chaotic synchronization mechanisms
is to render the trajectories of two chaotic systems, 0.4

generated from arbitrary initial conditions, identical.


0.2
Since there exists one-to-one correspondence between
the initial condition of chaotic system and its symbolic 0
dynamic sequence [29], the synchronization problem
is mainly dependent on the initial condition estimation. −0.2
5 10 15 20 25
One of the successful methods that exploits the unique
correspondence between initial condition and its sym- Fig. 2 Symbolic dynamic sequence associated to the chaotic
bolic dynamic sequence to achieve robust synchroniza- orbit of the Skew Tent map, generated from p = 0.5927 and IC
tion is the symbolic dynamic-based method (SDM) = 0.4158
[29,30]. This method is very practical for chaotic sys-
tems that admit a generating partition composed of two
symbols partitions Ci , i = 1, 2 . By assuming that For example, let
f i the restriction of f on Ci monotonic and invert-
S(n) = {0, 1, 1, 1, 1, 0, 1, 1, 0, 0, 1, 0, 0, 1, 0,
ible, thus f i−1 , the inverse mapping of f i , can be (4)
1, 0, 1, 1, 0, 0, 0, 0, 1, 1}
defined and iterated backward (in the reverse direc-
tion) in order to estimate the unknown initial condi- be the symbolic dynamic sequence associated to the
tion of any symbolic dynamic sequence. This process chaotic orbit of the Skew Tent map plotted in Fig. 2. To
results in the unique initial condition x0 that belongs to estimate the initial condition generating this sequence,
N −i
i=1 f (si ), according to the generating partition. using the symbolic dynamic-based method, we need to

123
Symbolic dynamic description and synchronization

iterate backward the inverse mapping of the Skew tent the keystream and I C j the initial conditions, where
map (5), from a random initialization (x0 = 0.7500), i = 1, . . . , N , j = 1, . . . , 3, and ⊕ means the bitwise
guided by the last symbols of the symbolic dynamic XOR.
sequence (4).

p ∗ xi−1 if si = 0 3.1 Chaotic systems initialization
f −1 (si ) =  ))
1 − ((1 − p) ∗ xi−1 if si = 1
0.7500 → 0.6945 → 0.4116 → 0.2440 → 0.1446 → The proposed stream cipher takes as input a secret key:
0.0857 → 0.9651 → 0.6069 → 0.3597 → 0.8535 → {p1, p2, p3} and a randomly selected initial condition
0.5059 → 0.7940 → 0.4706 → 0.2789 → 0.8864 → IC. The Skew Tent map is chosen as a driving system,
0.5254 → 0.3114 → 0.8732 → 0.6444 → 0.3819 → which generates the synchronization vector from IC.
0.8444 → 0.6561 → 0.7328 → 0.7015 → 0.4158 This vector of size M bits (25 < M < 50) is sent
(5) directly via public channel for maintaining the SDM
synchronization at the receiver, as explained in the pre-
The observation of the resulting values from the back-
vious section. Once the synchronization established,
ward iterations process shows that the initial condition
the chaotic maps initialization is realized by calculat-
estimation converges successfully (x0 = 0.4158). This
ing three initial conditions (one for each chaotic map)
synchronization method ensures the initial condition
from the shared IC:
sharing so efficiently, making the exact reconstruction
of desired chaotic sequence, regardless of its length,
Chaotic maps initialization
possible. Noting that the precision recovery of the ini-
tial condition determines the synchronization success, Input: p1, p2, p3, IC
which is proportional to the symbol number M, with Output: IC1, IC2, IC3
an order accuracy of 21M [31]. Under the experimental IC1 ←− f (IC, p1)
results in [32] a minimum of 25 symbols are needed to IC2 ←− g(IC1, p2)
be sent to the receiver for achieving perfect synchro- IC3 ←− h(IC2, p3)
nization.

3 Cryptosystem description 3.2 keystream generation

The interest of using chaotic systems in cryptographic The keystream generator structure is based on the com-
applications lies in their exploitation as pseudo-random bination of three chaotic sequences generated from one
numbers generators. Although chaotic systems gener- Skew Tent map and two Bernoulli maps, to produce a
ate dynamic behaviors with good randomness proper- random bit at each round following these steps:
ties but remain completely deterministic according a
mathematical development law. Thus, it is not enough One round of the keystream generator
to base the cryptosystems only on the chaotic behav-
Input: p1, p2, p3, IC1, IC2, IC3
ior; it should rather exploit it with robust encryption
Output: Ki
procedure and a suitable driving signal, to meet the
xi ←− f i (I C1, p1)
criterias of robustness and efficiency. The proposed
yi ←− g i (I C2, p2)
cryptosystem is a stream cipher, which exploits the
pseudo-random sequences produced by one Skew Tent z i ←− h i (I C3, p3)
map and two Bernoulli maps, for maintaining the SDM ki ←− s(xi ) ⊕ s(yi )
synchronization between transmitter and receiver, and i f s(z i ) = 0 permute (z i , xi )
the keystream generation. The complete description else permute (z i , yi )
of our cryptosystem is divided into three stages as
follows:
Let f, g, and h be the first Bernoulli map, the sec- The originality of our keystream generator lies in
ond Bernoulli map, and the Skew Tent map func- the chaotic maps perturbation driven by the Skew Tent
tions; Pti denotes the plaintext, Ci the ciphertext, K i map. It consists to permute Skew Tent map state with

123
N. W. Abderrahim et al.

Fig. 3 Schematic
description of the proposed
cryptosystem

that of first Bernoulli map if the driving bit = 0, or with 4 Security evaluation
that of second Bernoulli map if the driving bit = 1.
The chaotic nature of this perturbation improves signif- The security evaluation of secret key cryptosystems,
icantly the randomness of the chaotic sequences gen- according to Kerchhoffs–Shannon principle, depends
erated. Noting that all chaotic real-valued sequences on two essential factors: the secret key length and
used in our keystream generator are converted in binary the encryption process strength. In the case of stream
ones (symbolic dynamic sequences) using the thresh- ciphers, the encryption security level is determined by
old function (3), with critical state xc = p3 for the the statistical quality of the pseudo-random numbers
Skew Tent map and xc = 1/2 for the Bernoulli maps. generator, which plays a crucial role in stream ciphers
implementation.

3.3 Encryption/decryption process

The proposed cryptosystem is designed under the prin- 4.1 Statistical analysis
ciple of binary additive stream cipher, in which the
encryption process is performed using only “XOR” The most proposed attacks against stream ciphers aim
operation between the confidential data and the to detect and exploit statistical weakness of the pseudo-
keystream. Decryption process is performed in a sim- random numbers generator, through keystreams analy-
ilar manner, where the data bits stream are recovered sis. So it is necessary to evaluate the keystream genera-
by the coherent decoding. tor quality by means of adequate tests. We have used the
Ci = Pti ⊕ K i NIST SP 800-22 standard tests, published by American
National Institution of Standard and Technology Infor-
Pti = Ci ⊕ K i mation [33], for this purpose. The tests were applied
To achieve the SDM synchronization successfully, on 100 pseudo-random sequences of 106 bits length,
the emitter/ receiver should use identical chaotic sys- generated from random initial conditions and para-
tems with the same parameters configuration, since meters. The results given in Table 1 show that our
their parameters constitute the secret key of our keystream generator passes all statistical tests success-
cryptosystem. After the initialization step, the entire fully (all tests proportions exceed the confidence level
binary sequences generated at the transmitter can = 96 %). This implies that it possesses desired proper-
be reproduced in synchronous manner without error ties of pseudo-random generators. Moreover, the appli-
at the receiver. Thus, decryption can be progres- cation of the keystream generated using the secret key:
sively achieved during the reception of the ciphertext, {p1 = 2.98145364517528; p2 = 3.73092518472690;
by XORing the encrypted bits with the regenerated p3 = 0.67928153074916} and IC = 0.3725; in lena.jpg
keystream bits. The diagram in Fig. 3 illustrates the image encryption, proves its perfect confusion effect,
complete cryptosystem structure. where the encrypted image show a good randomness:

123
Symbolic dynamic description and synchronization

Table 1 The results of


Statistical test p value Pass rate (%) Result
NIST SP800-22 statistical
tests Frequency 0.455937 100 Success
Block frequency (m =128) 0.657933 99 Success
Cumulative sums Forward 0.075719 100 Success
Cumulative sums Reverse 0.334538 99 Success
Runs 0.062821 99 Success
Long runs of on’s 0.437274 100 Success
Binary Matrix Rank 0.455937 99 Success
Spectral DFT 0.816537 100 Success
No overlapping templates (m = 9) 0.983453 100 Success
0verlapping templates (m = 9) 0.474986 98 Success
Universal (L = 7, Q = 1280, K = 141577) 0.637119 99 Success
Approximate entropy (m = 10) 0.816537 100 Success
Random excursions 0.867692 100 Success
Random excursions variant 0.897763 100 Success
Serial (m = 16) p value1 0.699313 99 Success
Serial (m = 16) p value2 0.851383 100 Success
Linear complexity (M = 500) 0.574903 99 Success

– High entropy value = 7.9992; 4.3 Known-plaintext attacks


– Very low correlation coefficient between the origi-
nal and the encrypted image = 5.52e−004; A serious drawback of stream ciphers is the weakness
– Uniform distribution of the encrypted image his- against known-plaintext attacks, where the cryptana-
togram (Fig. 4) which is significantly different from lyst can obtain multiple keystreams by simply XOR-
that of the original image. ing plaintext/ciphertext pairs. As for chaotic cryptosys-
tems, it is possible to exploit the relationship between
consecutive values of discrete chaotic sequences con-
stituting the keystream, by means of nonlinear estima-
tion techniques and statistical tools, especially when
4.2 Secret key space estimation
the keystream corresponds to direct output of chaotic
generator. Indeed, this kind of attacks allows to identify
The secret key length is directly related to the desired
the secret parameters and the initial values, from only
security level of the cryptosystem, so it is necessary
observation of few chaotic sequences samples [34,35],
to use a large key space (typically > 2128 ) to prevent
and then becomes possible to break the cryptosys-
brute force attacks. The integration of three chaotic
tem completely, by reconstructing the entire chaotic
maps with different control parameters in the pro-
sequences used in encryption. The proposed struc-
posed cryptosystem is to enhance the quality of the
ture for our keystream generator lays many difficulties
keystream generator and to increase the secret key
against its exploitation under know-plaintext attacks:
space, which corresponds to the three control para-
meters of the chaotic systems. With a precision of – All chaotic sequences used in our keystream gener-
252 ≈ 2×1016 for each parameter, the key size exceeds ator are discretized into symbolic dynamic
2150 . This is large enough to resist brute force attack. sequences, which reveal partial information about
Furthermore, these secret parameters are independent the real-valued chaotic states;
from each other, so the partial knowledge of the key – The keystream generated depends on the dynam-
should never imply the knowledge of the rest of para- ics of two Bernoulli maps, perturbed chaotically
meters. according to the Skew Tent map. This mixing of

123
N. W. Abderrahim et al.

Fig. 4 Histograms Original image Encrypted image


visualization of original and
encrypted image

1000 300

800
200
600

400
100
200

0 0
0 50 100 150 200 250 0 50 100 150 200 250

multiple chaotic systems does not allow to distin- keystream generators that reflect a strong sensitivity to
guish the symbolic sequences generated from each small input changes, and which provide a high diffusion
one; level. The sensitivity analysis of our keystream gener-
– The symbolic dynamic sequences of the three ator is done by changing slightly the initial condition,
chaotic maps are uncorrelated from each other and or one parameter value of the secret key and calculat-
uniformly distributed, making difficult to tracing ing the corresponding keystreams difference rate (Kdr),
back their values from the keystream bits; according to the following formula [36]:
– The results of NIST tests confirm the high random-
Diff(K , K 1) + Diff(K , K 2)
ness of our keystream generator, which means that K dr (K ) = × 100 %,
2×N
no statistical prediction can take place.
(6)
Hence, the application of known-plaintext attack on
our cryptosystem is ineffective, since the observation where Diff(K,K1) and Diff(K,K2) are the different
of keystreams used in encryption does not leak out any bits numbers between the reference keystream K and
information concerning the real-valued states, or the the modified ones K 1 and K 2 of size N = 106 .
chaotic systems parameters. We have used the IC = 0.2915683749 and the secret
key: { p1 = 2.9987938562; p2 = 3.0057031642;
p3 = 0.6573629815} for generating K , and different
4.4 Differential attack initial conditions: IC + IC and IC − IC, or secret
key parameter: p1+p1 and p1−p1 for generating
The differential cryptanalysis performs under a chosen- K 1 and K 2 respectively, with IC = p1 = 10−15 .
plaintext attack, where the attacker applies a chosen For the proposed keystream generator, a slight vari-
modification to the encryption process input and then ation in IC or any chaotic map parameter affects all
evaluates its impact on the output, in order to find chaotic maps trajectories, which implies a significant
the most probable key that was used in encryption. difference in the binary keystreams obtained, with
When the encryption process is independent from the change rate K dr ≈ 50 %. Furthermore, the use of the
plaintext, as in the case of additive stream ciphers, the generated keystreams: K, K1, and K2 in lena image
focus of the differential analysis is about the keystream (Fig. 4) encryption produces different outputs with
generator. However this attack does not work against change rate: 99.6231 % for the variation of initial con-

123
Symbolic dynamic description and synchronization

Table 2 Correlation coefficients between the reference keystream and those generated using different IC and p1
Keystream length 10000 100000 1000000

Different IC 0.0345 −0.0013 7.7887e−004


Different p1 0.0057 0.0013 3.6652e−004

dition and 99.6276 % for the variation of secret key which simplifies the resynchronization process in the
parameter. This high impact of the keystream change case of synchronization loss.
on the ciphertext makes the cryptosystem of high
security against statistical and differential attacks. The
4.6 Analysis of sensitivity to change in the secret key
correlation coefficients calculated between reference
and noise resistance
keystream and modified ones, given in Table 2, confirm
also the strong sensitivity of our keystream generator
In the proposed cryptosystem the first M symbols (bits)
to an extremely small change. Noting that the corre-
Si , i = 1, . . . , M that correspond to the initialization
lation becomes negligible when the keystream length
vector, should be transmitted directly to receiver, via
increases, so it is preferable to iterate the keystream
public channel, to maintain SDM synchronization. The
generator several times before using its output for
main advantage of the SDM synchronization is its high
encryption, in order to insure an independent output as
quality of synchronization with low complexity, which
possible from input, and avoiding such kind of attacks.
can be exploited in secure communication using con-
ventional digital transmission techniques. Even when
4.5 Resynchronization attack the received signal is corrupted by an additive white
gaussian noise: S(X ) = S(X + W ), the chaotic sym-
This attack is based on the manipulation of synchro- bolic sequence remains detectable, so that the received
nization signal, which often reveals useful informa- initialization vector can be correctly estimated using an
tion about the chaotic dynamics employed in encryp- conventional matched filter.
tion. The use of the symbolic dynamic-based method Once the initialization established, the legitimate
synchronization in the proposed cryptosystem exploits receiver generates the same keystream used at the emit-
efficiently the two principal characteristics of chaotic ter, in deterministic way, where the timing of decryption
systems: sensitivity to initial condition and determin- process is adapted by reference to the clock signal. This
ism, against such attacks. kind of stream cipher is robust to transmission errors
The synchronization vector generated from the propagation, and it offers a good performance even in
Skew Tent map serves to share the initial condition IC, low SNR. Our cryptosystem performances in terms of
which is used to initialize the three chaotic maps in indi- bit error rate (BER) and the cryptosystem in terms of bit
rect manner. So, even when an attacker intercepts this error rate (BER) and the correlation coefficients mea-
vector, he cannot achieve successful synchronization sured between the plain image (Fig. 4) and decrypted
without an exact knowledge of chaotic maps parame- ones, for different SNR are given in Table 3. However,
ters. the decryption is impossible without the exact knowl-
However, the IC must be changed regularly, to edge of the initial condition and the critical parameters
avoid malicious exploitation of synchronization vec- of the three chaotic maps, constituting the secret key
tors and eliminate collision cases. The high sensitiv- of our cryptosystem. If we try to decrypt the encrypted
ity of chaotic systems to variations satisfies this con- image of Fig. 4 with the same initial condition and
straint, since a change related to nearby initial condi- secret key used in encryption: IC = 0.3725 and {P1 =
tions values will generate a significant divergence in the 2.98145364517528; P2 = 3.73092518472690; P3 =
keystream, and thus prevents to predict many keystream 0.67928153074916}, except a slight variation of 10−15
bits with reasonable probability, via statistical tools. in either of the parameters (P2 = 3.730925184726901),
On the other hand, the deterministic nature of chaotic we obtain a highly uncorrelated output with the original
systems allows the legitimate receiver to generate the image (correlation coefficient = −0.0025), as shown
keystream needed for decryption in deterministic way, in Fig. 5.

123
N. W. Abderrahim et al.

Table 3 Correlation coefficients between the plain image and duction, which penalizes their performance. Further-
the obtained decrypted images for different SNR more, the choice of simple chaotic maps that do not
SNR BER Correlation require high computing power, and the combination of
coefficient their symbolic dynamic sequences by the XOR oper-
ator, make the keystreams generation very fast even
5 0.0376 0.8888
7 0.0125 0.9610 in double precision arithmetic. Our keystream genera-
10 7.6625e−004 0.9975 tor can reach 10 Mbps, On an Intel Core i7 processor
12 3.1275e−005 0.9998 clocked at 3.5 GHz, with 8G of RAM.
15 0 1
5 Conclusion

In this paper we have presented a new chaotic stream


cipher, based on symbolic dynamic sequences gener-
ated from one-dimensional chaotic maps, where their
parameters constitute the secret key of our cryptosys-
tem. The synchronization of emitter/receiver via the
symbolic dynamic-based method (SDM) can success-
fully decrypt data with high level of security and
robustness. Moreover, the combination of the chaotic
sequences in the proposed keystream generator is very
efficient and designed under the concept of a one-time
pad:
– The chaotic symbolic dynamic sequences are easy
to generate and synchronize, only few parameters
and functions are needed for generating keystreams
with desired length;
– Each chaotic system can generate an enormous
number of decorrelated sequences by simply chang-
Fig. 5 Sensitivity to change in the secret key: decrypted image ing its initial condition or critical parameter;
with a slightly different secret key
– The security evaluation shows that the proposed
keystream generator has good encryption effect,
4.7 Performance analysis and high sensitivity to small change in the secret
key.
The encryption process of additive synchronous stream Thus, it can be concluded that the exploitation of
ciphers is done usually by XORing the keystream bits symbolic dynamic description of the chaotic sys-
with the plaintext bits, and their performance in terms tems behaviors can create primordial contributions
of execution time depends on the initialization and in the design of stream ciphers, in accordance with
the keystream generation steps, either for encryption modern transmissions.
or decryption.The chaotic systems initialization in the
proposed algorithm is based on single initial condi-
tion IC selected randomly and shared via the synchro- References
nization vector. It is used to initialize the three chaotic 1. N. B. of Standards: Data Encryption Standard (DES). U.S.
maps through a very simple initialization process as Department of Commerce. Washington D.C (1977)
explained in Sect. 3.1. This step does not influence the 2. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer,
algorithm speed, and it is clearly advantageous over Berlin (2002)
3. Chowdhury, D.R., Rijmen, V. and Das, A.: Analysis of RC4
conventional stream ciphers, where their initialization and Proposal of Additional Layers for Better Security Mar-
process are more complex and need a rigorous update gin. INDOCRYPT. Springer, Berlin Heidelberg LNCS 5365,
on several rounds before starting the bits stream pro- 27–39 (2008)

123
Symbolic dynamic description and synchronization

4. Briceno, M., Goldberg, I., Wagner, D.: A Pedagogical Imple- 21. Alvarez, G., Amig, J.M., Arroyo, D.: Lessons Learnt from
mentation of the GSM A5/1 and A5/2 “voice privacy” the Cryptanalysis of Chaos-Based Ciphers. Chaos-Based
Encryption Algorithms (1999) Cryptography. Springer, Berlin (2011)
5. Shinbrot, T., Ditto, W., Grebogi, C., Ott, E., Spano, M., 22. Tsekeridou, S., Solachidis, V., Nikolaidis, N., Nikolaidis,
Yorke, J.A.: Using the sensitive dependence of chaos (the A.: Statistical Analysis of a Watermarking System Based on
butterfly effect) to direct trajectories in an experimental Bernoulli Chaotic Sequences. Signal Processing, vol. 81,
chaotic system. Phys. Rev. Lett. 68, 2863–2866 (1992) pp. 1273–1293. Elsevier, Berlin (2001)
6. Peja, J., Skrobek, A.: Chaos-Based Information Security. 23. Hasler, M., Maistrenko, Y.L.: An introduction to the syn-
Springer, New York (2010) chronization of chaotic systems: coupled skew tent maps.
7. Pecora, L.M., Carrol, T.L.: Synchronization in chaotic sys- IEEE Trans. Circuits Syst. 1 44, 856–866 (1997)
tems. Phys. Rev. Lett. 64, 821–824 (1990) 24. Li, S.: Analyese and New Designs of Digital Chaotic
8. Koronovskii, A.A., Moskalenko, O.I., Hramov, A.E.: On the Ciphers. PhD thesis. School of Electronics and Information
use of chaotic synchronization for secure communication. Enginnering. Xian Jiaotong University, China (2003)
Physics-Uspekhi 52, 1213–1238 (2009) 25. Schuster, H.G., Just, W.: Deterministic Chaos: An Introduc-
9. Chen, J.Y., Wong, K.W., Cheng, L.M., Shuai, J.W.: A secure tion, 4th edn. Wiley-VCH, Weinheim (2005)
communication scheme based on the phase synchronization 26. Feltekh, K., Fournier-Prunaret, D., Belghith, S., Jemaa, Z.:
of chaotic systems. Chaos 13, 508–514 (2003) Comparison of random and deterministic characteristics of
10. Li, Z., Xu, D.: A Secure Communication Scheme Using Pro- chaotic signals issued from a one-dimensional piecewise lin-
jective Chaos Synchronization. Chaos, Solitons and Frac- ear map. In: International Symposium on Nonlinear Theory
tals, vol. 22, pp. 477–481. Elsevier, Oxford (2004) and its Applications. Majorca, Spain (2012)
11. Liu, J., Chen, H.F., Tang, S.: Synchronized chaotic optical 27. Tsekeridou, S., Solachidis, V., Nikolaidis, N., Nikolaidis, A.,
communications at high bit rates. Quantum Electron. IEEE Efas, A., Pitas, I.: Statistical analysis of a watermarking sys-
38, 1184–1196 (2002) tem based on Bernoulli chaotic sequences. Signal Process.
12. Argyris, A., Syvridis, D., Larger, L., Annovazzi-Lodi, V.: 81, 1273–1293 (2001)
Chaos-based communications at high bit rates using com- 28. Cristea, B.: Statistical properties of chaotic binary
mercial fibre-optic links. Nature 438, 343–346 (2005) sequences. IEEE Trans. Inf. Theory 44(6), 2743–2760
13. Locquet, A.: Chaos-Based Secure Optical Communications (2008)
Using Semiconductor Lasers. Handbookof Information and 29. Cong, L., Xiaofu, W., Songgeng, S.: A general efficient
Communication Security. Springer, New York (2010) method for chaotic signal estimation. IEEE Trans. 47, 1424–
14. Liu, L., Wu, X., Hu, H.: Estimating system parameters of 1427 (1999)
Chua’s circuit from synchronizing signal. Phys. Lett. 324, 30. Ling, C., Wu, X.: A back-iteration method for reconstruct-
36–41 (2004) ing chaotic sequences in finite-precision machines. Circuits
15. Shujun, Li, Alvarez, G., Li, Z., Halang, W.A.: Analog Chaos- Syst. Signal Process. 27, 883–891 (2008)
Based Secure Communications and Cryptanalys is: A Brief 31. Kurian, A.P., Puthusserypady, S.: Secure digital communi-
Survey. PhysCon, Potsdam (2007) cation using chaotic symbolic dynamics. Turk. J. Electr. Eng.
16. Liu, Y., Tang, W.K.: Adaptive Synchronization of Chaotic 14, 195–207 (2006)
Systems and its Uses in Cryptanalysis. Springer, Berlin Hei- 32. Abid, A.M., Nasir, Q., Elwakil, A.S.: Implementation of
delberg (2009) an encrypted wireless communication system using nested
17. Zaher, A., Abu-Rezq, A.: Noise considerations and crypt- chaotic maps. Int. J. Bifurc. World Sci. 20, 4087–4096
analysis of chaos-based secure communication systems. In: (2010)
IEEE Symposium on Computational intelligence in control 33. Rukhin, A., et al.: A Statistical Test Suite for Random
and automation (CICA), 88–93 (2011) and Pseudorandom Number Generators for Cryptographic
18. Schweizer, J., Schimming, T.: Symbolic dynamics for Applications. National Institute of Standard and Technol-
processing chaotic signals-I: noise reduction of chaotic ogy. NIST 800–22 (2001)
sequences. IEEE Trans. CircuitsSyst. 1 48, 1269–1282 34. Hu, H., Wu, X., Zhang, B.: Parameter estimation only from
(2001) the symbolic sequences generated by chaos system. Chaos
19. Kurian, A.P., Puthusserypady, S.: Self-synchronizing Solitons Fractals 22, 359–366 (2004)
chaotic stream ciphers, vol. 88, pp. 2442–2452. Elsevier, 35. Wang, K., Pei, W., Hou, X., Shen, Y., He, Z.: Symbolic
Berlin (2008) dynamics approach to parameter estimation without initial
20. Galiuk, S.D., Kushnir, M.Y., Politanskyi, R.L.: Communi- value. Phys. Lett. 374, 44–49 (2009)
cation with use of symbolic dynamics of chaotic systems. 36. Lian, S., Sun, J., Wang, Z.: A Block Cipher Based on a
Microwave and Telecommunication Technology (CriM- Suitable Use of the Chaotic Standard Map. Chaos Solitons
iCo). IEEE, 423–424 (2011) and Fractals. Elsevier, Berlin (2005)

123

You might also like